In the past two decades, maritime transport traffic has increased, especially in the case of container flow. The BAP (Berth Allocation Problem) (BAP) is a main problem to optimize the port terminals. The current manuscript explains the DBAP problems in a typical arrangement that varies from the conventional separate design station, where each berth can simultaneously accommodate several ships when their entire length is less or equal to length. Be a pier, serve. This problem was then solved by crossing the Red Colobuses Monkey Optimization (RCM) with the Genetic Algorithm (GA). In conclusion, the comparison and the computational experiments are approached to demonstrate the effectiveness of the proposed method contrasted with other methods that were existing in the other studies. The capacity of the container in terminal was also discussed in the current based on the diverse scenarios that possibly will occur.
The reaction of 2-amino-benzothiazole with bis [O,O-2,3,O,O – 5,6 – (chloro(carboxylic) methiylidene) ] – L – ascorbic acid (L-AsCl2) gave new product 3-(Benzo[d]Thaizole-2-Yl) – 9-Oxo-6,7,7a,9-Tertrahydro-2H-2,10:4,7-Diepoxyfuro [3,2-f][1,5,3] Dioxazonine – 2,4 (3H) – Dicarboxylic Acid, Hydro-chloride (L-as-am)), which has been insulated and identified by (C, H, N) elemental microanalysis (Ft-IR),(U.v–vis), mass spectroscopy and H-NMR techniques. The (L-as am) ligand complexes were obtained by the reaction of (L-as-am) with [M(II) = Co,Ni,Cu, and Zn] metal ions. The synthesized complexes are characterized by Uv–Visible (Ft –IR), mass spectroscopy molar ratio, molar conductivity, and Magnetic susceptibility techniques. (
... Show MoreThe voice had a special place in the writting of the Andalusian poet (Ibn al-Abar ) , which aroused my attention because of the sonic capacity of the lettering inside the poetic at Ibn al-Abar poems . So Istudied the qualities of the lettering , structures and their exits . Scientists have not been able to determine the musical from the nonmusical sound , but we find the innate ability of Ibn al-Abar , which was able to determine this by using the lettering the right places and to revival the life to reflect the moments of his life , therefore came votes to express his purposes of praise and pride Etc. The poet Ibn al-Abar could exploit the lettering features in the effect of bilateral – static and moving and its ability to e
... Show MoreThe aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreThe aim of this study is to compare the effects of three methods: problem-based learning (PBL), PBL with lecture method, and conventional teaching on self-directed learning skills among physics undergraduates. The actual sample size comprises of 122 students, who were selected randomly from the Physics Department, College of Education in Iraq. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The data was analyzed and statistical results rejected null hypothesis of this study. This study revealed that there are no signifigant differences between PBL and PBL with lecture method, thus the PBL without or with lecture method enhances the self-directed learning skills bette
... Show MoreBackground: Scientific education aims to be inclusive and to improve students learning achievements, through appropriate teaching and learning. Problem Based Learning (PBL) system, a student centered method, started in the second half of the previous century and is expanding progressively, organizes learning around problems and students learn about a subject through the experience of solving these problems.Objectives:To assess the opinions of undergraduate medical students regarding learning outcomes of PBL in small group teaching and to explore their views about the role of tutors and methods of evaluation. Type of the study: A cross-sectional study.Methods: This study was conducted in Kerbala Medical Colleges among second year students
... Show Moreيتناول البحث انتشار ظاهرة إعادة فرز وتقسيم الوحدات السكنية ذات المساحات الكبيرة الى قطع
صغيرة وبمساحات تصل أحيانا الى اقل من 100 م 2 وعدم التقيد بقوانين البناء ، وقد وجدت اسباب عدة لتفاقم
وانتشار هذه الظاهرة منها ت ردي الحالة الاقتصادية للمواطن والكثافة السكانية المتزايدة والانشطارات العائلية
وارتفاع بدلات الإيجار وعدم توفر السكن ، وهناك من استغل هذا الامر نتيجة لضعف الرقابة من قبل
الجهات المتخصصة في
Superconducting compound Bi2Sr2-xYxCa2Cu3O10+δ were Synthesized by method of solid state reaction, at 1033 K for 160 hours temperature of the sintering at normal atmospheric pressure where substitutions Yttrium oxide with Strontium. When Y2O3 concentration (0.0, 0.1, 0.2, 0.3, 0.4 and 0.5). All specimens of Bi2Sr2Ca2Cu3O10+δ superconducting compounds were examined. The resistivity of electrical was checked by the four point probe technique, It was found th