We have provided in this research model multi assignment with fuzzy function goal has been to build programming model is correct Integer Programming fogging after removing the case from the objective function data and convert it to real data .Pascal triangular graded mean using Pascal way to the center of the triangular.
The data processing to get rid of the case fogging which is surrounded by using an Excel 2007 either model multi assignment has been used program LNDO to reach the optimal solution, which represents less than what can be from time to accomplish a number of tasks by the number of employees on the specific amount of the Internet, also included a search on some of the
... Show MoreSnS has been widely used in photoelectric devices due to its special band gap of 1.2-1.5 eV. Here, we reported on the fabrication of SnS nanosheets and the effect of synthesis condition together with heat treatment on its physical properties. The obtained band gap of the SnS nanosheets is in the rage of 1.37-1.41 eV. It was found that the photo-current density of a thin film comprised of SnS nanosheets could be enhanced significantly by annealing treatment. The maximum photo-current density of the stack structure of FTO/SnS/CdS/Pt was high as 389.5 mu A cm(-2), rendering its potential application in high efficiency solar hydrogen production.
The wake potential and wake phenomena for swift proton in an amorphous carbon target were studied by utilising various dielectric function formalisms, including the Drude dielectric function, the Drude–Lorentz dielectric function and quantum dielectric function. The Drude model results exhibited a damped oscillatory behaviour in the longitudinal direction behind the projectile; the pattern of these oscillations decreases exponentially in the transverse direction. In addition, the wake potential extends slightly ahead of the projectile which also depends on the proton coordinate and velocity. The effect of electron binding on the wake potential, characterised by the ratio to 0.1, has been studied alongside the Drude–Lorentz dielectric
... Show MoreA detailed study of adsorption from solution of amitriptyline-HCl, chlorpromazine-HCl and
chlordiazepoxide-HCl on bentonite clay surface has been performed at variable conditions of
temperature, pH and ionic strength. It is aimed in this work to explore the capability of this clay in
treatment of poisoning by the mentioned drugs if taken in quantities higher than the usual doses.
Quantities of drugs adsorbed have been determined by UV spectrophotometric technique. The
sequence of adsorption in neutral media at 37.5 CÙ’ followed the order:
Amitriptyline-HCl > chlorpromazine-HCl > chlordiazepoxide-HCl.
The results were discussed in the light of Langmuir and Freundich adsorption isotherms. The usual
basic th
In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreВ статье рассматриваются понятие наглядности и ее классификация, эффективное применение принципа наглядности, возможность и преимущество использования наглядности и современные инструменты ее реализации в ираке.
Вследствие глобальных изменений во всем мире изменилась и роль иностранного языка в системе образования. Современный человек, шагающий в ногу со временем, не мыслит себя без зна
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show More