The research aims to determine the mix of production optimization in the case of several conflicting objectives to be achieved at the same time, therefore, discussions dealt with the concept of programming goals and entrances to be resolved and dealt with the general formula for the programming model the goals and finally determine the mix of production optimization using a programming model targets to the default case.
E-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac
The aims of the paper are to present a modified symmetric fuzzy approach to find the best workable compromise solution for quadratic fractional programming problems (QFPP) with fuzzy crisp in both the objective functions and the constraints. We introduced a modified symmetric fuzzy by proposing a procedure, that starts first by converting the quadratic fractional programming problems that exist in the objective functions to crisp numbers and then converts the linear function that exists in the constraints to crisp numbers. After that, we applied the fuzzy approach to determine the optimal solution for our quadratic fractional programming problem which is supported theoretically and practically. The computer application for the algo
... Show MoreThe aim of this study is to detect the level of psychological stress among unemployed individuals and the level of their wellbeing by finding the correlation between these two variables.
The research sample consisted of (99) people who are currently unemployed and registered at the Ministry of Labor Affairs.
Schafer (1996) scale for psychological stress was used and alongside Ziout's (2012) scale for wellbeing.
The results of the research showed an inverse relation between being unemployed and having wellbeing.
&nb
... Show MoreThe study concentrated on measuring the lipid peroxidation marker malon di aldehyde (MDA) in sera of thirty five patients with minor Thalassemia (Tm), thirty five with major Thalassemia (TM) and thirty five healthy control, their age ranged from (17-30) years. Erythrocytes enzymes (Glutathione -S - transferase (GST )and Catalase) were assayed . The results showed a significant elevation in (MDA) in sera of both patient groups compared to control.
An increase in the activity of catalase and GST in erythrocytes of
minor Thalassemic patients compared to control was found to be significant. Also, a high significant increase in the
... Show MoreTo evaluate the effects of the thermal analysis and temperature of the atmospheric heat on the optical system. it varying the thermal expansion (positive or Negative Values) of the material and then changes the characteri of the optical system properties such as radius of curvetur of the surfaces, size of the aperture stop ect.
This paper had calculated the accepted ratio of the temperature variable on the optical system during analyzing the effect of thermal analysis on the Radial Energy Distribution for +20C0 and +50C0 •
In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show More