Nurse scheduling problem is one of combinatorial optimization problems and it is one of NP-Hard problems which is difficult to be solved as optimal solution. In this paper, we had created an proposed algorithm which it is hybrid simulated annealing algorithm to solve nurse scheduling problem, developed the simulated annealing algorithm and Genetic algorithm. We can note that the proposed algorithm (Hybrid simulated Annealing Algorithm(GS-h)) is the best method among other methods which it is used in this paper because it satisfied minimum average of the total cost and maximum number of Solved , Best and Optimal problems. So we can note that the ratios of the optimal solution are 77% for the proposed algorithm(GS-h), 28.75% for Si
... Show MoreIn many video and image processing applications, the frames are partitioned into blocks, which are extracted and processed sequentially. In this paper, we propose a fast algorithm for calculation of features of overlapping image blocks. We assume the features are projections of the block on separable 2D basis functions (usually orthogonal polynomials) where we benefit from the symmetry with respect to spatial variables. The main idea is based on a construction of auxiliary matrices that virtually extends the original image and makes it possible to avoid a time-consuming computation in loops. These matrices can be pre-calculated, stored and used repeatedly since they are independent of the image itself. We validated experimentally th
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreDBNRAAK Mohammed, International Journal of Research in Social Sciences and Humanities, 2020
Gender and culture are among the factors that influence the process of understanding and interpreting different types of communication, especially images. The current study, which is a part of a master’s thesis, aims at investigating the role of gender and culture in interpreting and understanding the caricatures that deal with women’s issues in Arab societies. To this end, the researchers adopted Barthes’ (1957) concepts of denotation and connotation in his theory of mythologies in addition to Langacker’s (1987) theory of (Domains). The research concludes that the female subjects have better cognitive abilities in investing the signs within the selected caricatures. The other factor the study reached to is that the respondents
... Show MoreThe process of transformation from the central economy to a free economy requires restructuring the economy according to a new economic philosophy that relies on activating the role of private economic activity in which private and medium-sized institutions occupy an essential axis for their active role in the economies of all countries, especially those countries that have directed towards the market mechanism and sector leadership. The special process of economic development and the role that commercial banks can play in advancing the financing of these projects by establishing specialized business incubators for financing.
What encouraged countries to pay attention to these institutions is the ease of
... Show MoreThe study aimed to reveal the obstacles of administrative creativity among the leaders of secondary schools (the curriculum system) in the northern border region, which relate to the obstacles (organizational, motivational, and psychological). In addition, to identify the most important statistical differences between the responses of the members of the study sample, which attribute to the variables (educational qualification, year’s Administrative expertise). To achieve the goal of the study, the researcher used the descriptive analytical approach, and to verify the validity of the tool, it has presented to several referees and faculty members in the educational field. The validity of the internal consistency was also calculated for t
... Show More