Linear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will change the problem of linear programming and will affect the optimal solution, and therefore we need a method that helps us to stand on the impact of changing these constants on the optimal solution that has been reached. General concepts about the binary model and some related theories have also been addressed. By analyzing the sensitivity, we relied on real data for a company that transports crude oil and its derivatives. The mathematical model was formulated for it and the optimal solution was reached using the software. Ready-made sop WINQSB and then calculate the shadow price values for the binding constraints, in addition to what
in this paper fourth order kutta method has been used to find the numerical solution for different types of first liner
Electromechanical actuators are used in a wide variety of aerospace applications such as missiles, aircrafts and spy-fly etc. In this work a linear and nonlinear fin actuator mathematical model has been developed and its response is investigated by developing an algorithm for the system using MATLAB. The algorithm used to the linear model is the state space algorithm while the algorithm used to the nonlinear model is the discrete algorithm. The huge moment constant is varied from (-3000 to 3000) and the damping ratio is varied from (0.4 to 0.8).
The comparison between linear and nonlinear fin actuator response results shows that for linear model, the maximum overshoot is about 10%,
... Show MoreMost vegetation’s are Land cover (LC) for the globe, and there is an increased attention to plants since they represent an element of balance to natural ecology and maintain the natural balance of rapid changes due to systematic and random human uses, including the subject of the current study (Bassia eriophora ) Which represent an essential part of the United Nations system for land cover classification (LCCS), developed by the World Food Organization (FAO) and the world Organization for environmental program (UNEP), to observe basic environmental elements with modern techniques. Although this plant is distributed all over Iraq, we found that this plant exists primarily in the middle
... Show MoreThe results of the historical review of social and political realities in general show that the practical and procedural applications of social engineering as a particular activity primarily of the social and political characteristics of man and society emerged in modern Western societies before appearing in other societies, These results also show that the emergence of these practical reasons and their applications in the West has also seen the emergence of modern theoretical foundations there, which seems to be the usual and usual context everywhere and in most or not all areas of life. Since the social and political dimensions are intertwined in human life and are in full, comprehensive and lasting harmony, interest in this geometry h
... Show MoreThe paper presents the results of precise of the calculations of the diffusion of slow electrons in ionospheric gases, such as, (Argon – Hydrogen mixture, pure Nitrogen and Argon – Helium – Nitrogen) in the presence of a uniform electric field and temperature 300 Kelvin. Such calculations lead to the value Townsend's energy coefficient (KT) as a function of E/P (electric field strength/gas pressure), electric field (E), electric drift velocity (Vd), momentum transfer collision frequency ( ), energy exchange collision frequency ( ) and characteristic energy (D/?). The following physical quantities are deduced as function s E/P: mean free path of the electrons at unit pressure, mean energy lost by an electron per collision, mean velocit
... Show MoreAbstract. Fibrewise micro-topological spaces be a useful tool in various branches of mathematics. These mathematical objects are constructed by assigning a micro-topology to each fibre from a fibre bundle. The fibrewise micro-topological space is then formed by taking the direct limit of these individual micro-topological spaces. It can be adapted to analyze various mathematical structures, from algebraic geometry to differential equations. In this study, we delve into the generalizations of fibrewise micro-topological spaces and explore the applications of these abstract structures in different branches of mathematics. This study aims to define the fibrewise micro topological space through the generalizations that we use in this paper, whi
... Show MoreA Novel artificial neural network (ANN) model was constructed for calibration of a multivariate model for simultaneously quantitative analysis of the quaternary mixture composed of carbamazepine, carvedilol, diazepam, and furosemide. An eighty-four mixing formula where prepared and analyzed spectrophotometrically. Each analyte was formulated in six samples at different concentrations thus twentyfour samples for the four analytes were tested. A neural network of 10 hidden neurons was capable to fit data 100%. The suggested model can be applied for the quantitative chemical analysis for the proposed quaternary mixture.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More