The majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show MoreKeys to four genera and twelve species of the subfamily Phlaeothripinae (Phlaeothripidae) were constructed, these are: Haplothrips; Karnyothrips; Phlaeothrips; and Dolicholepta ,and the species are: Haplothrips cerealis Priesner; Haplothrips tritici kurdjumov, Haplothrips hukkineni Priesner; Haplothrips subtilissimus (Haliday) ؛ Haplothrips reuteri Karny; Haplothrips jasonis Priesner; Haplothrips sallloumensis Priesner ; Haplothrips pharao Priesner ; Phlaeothrips sycomri Priesner ; Karnyothrips flavipus (Jones); Karnyothrips melaleucus (Bagnall) ; Dolicholepta micrurus (Bagnall). These were collected from Baghdad
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThe research deals with Iraq's position of the Lebanese civil war and the Efforts made by Iraq in order to stop the bleeding of this war, the research also deals with the nature of regime in Lebanon and the developments that preceded the war and the positions of the internal and external competing forces, as weu as handling the Iraqi Syrian disagreement and it's impaet on the situation of Lebanon and the war developments.
The research focused on the Iraq's position towards the externd proposed solutions to solve the Lebanese civil war.
B3LYP density functional is utilized for probing the effect of decorating Al, Ga, and In on the sensing performance of a boron phosphide nanotube (BPNT) in detecting the 2-chloroethanol (CHE) molecule. We predict that the interaction of pure BPNT with CHE is physisorption, and the sensing response (SR) of BPNT is approximately 6.3. The adsorption energy of CHE is about − 26.3 to − 91.1, − 96.6, and − 100.3 kJ/mol, when the Al, Ga, and In metals are decorated on the BPNT surface, respectively. This indicates that the decorated metals significantly strength the interaction. Also, the corresponding SR meaningfully rises to 19.4, 41.0, and 93.4, indicating that by increasing the atomic number of metals, the sensitivity i
... Show MorePhysiological status and litter size can indeed have a significant impact on ewes' hematological parameters, which are essential indicators of their health. Therefore, this study examined the hematological profiles of ewes during pregnancy with single and twins in the Awassi ewes. The present study involved 232 ewes in good health and at sexual maturity. Among them, 123 ewes had single pregnancies, while 109 ewes had twin pregnancies. The age range of the ewes included in the study was between 3.5 and 4.5 years. Hematological tests were conducted on the sheep's blood samples promptly following collection. The findings demonstrated variations in hematological parameters among pregnant
... Show MoreData Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show More