In the past two decades, maritime transport traffic has increased, especially in the case of container flow. The BAP (Berth Allocation Problem) (BAP) is a main problem to optimize the port terminals. The current manuscript explains the DBAP problems in a typical arrangement that varies from the conventional separate design station, where each berth can simultaneously accommodate several ships when their entire length is less or equal to length. Be a pier, serve. This problem was then solved by crossing the Red Colobuses Monkey Optimization (RCM) with the Genetic Algorithm (GA). In conclusion, the comparison and the computational experiments are approached to demonstrate the effectiveness of the proposed method contrasted with other methods that were existing in the other studies. The capacity of the container in terminal was also discussed in the current based on the diverse scenarios that possibly will occur.
The study aims to identify the bargaining differences between the governmental and private kindergarteners; the rivalry differences between the governmental and private kindergarteners; the rivalry and bargaining differences among private kindergarteners; and the rivalry and bargaining differences among governmental kindergarteners. The researchers had raised a question; is there any difference of rivalry and bargaining between governmental and private kindergarteners?. A total of (150) kindergarteners ranged from 5 to 6 years old, (90) student from governmental kindergarten and (60) student from private kindergarten, were selected as a sample of this study. Fifteen governmental and private kindergarten were chosen from al-rasafa directo
... Show MoreThe research aims to identify the positives formulation entrances authors depending on the setting retaining the names of the authors of Arab veterans and cons of setting the entrances to Arab authors ancient depending on the nickname by desktop diligence without reference to a setting retaining the potential to benefit other libraries disciple of retaining existing in sober university libraries. Use the survey method and adopted a questionnaire distributed to the research sample consisting of employees working in the libraries in question and the total number of forms that have been distributed (50) form .tousel search phrase conclusions from them .
1-The lack of authority control depends on it to find a
... Show More1-[4-(4-Acetyl-2-hydroxy-phenylazo)-phenyl]-ethanone (L1) and 1-[3-Hydroxy-4(4-nitro-phenylazo)-phenyl]-ethanone (L2) were readied by combination the diazonium salts of amines with 3-hydroxyacetophenone. (C.H.N) analyses, infrared spectra, UV–vis electronic absorption spectra, 1H and 13CNMR spectral mechanisms are use to identified of the ligands. Complexes of Ni+2 and Cu+2 were performed as well depicted. The formation of complexes has been identified by using atomic absorption of flame, elemental analysis, infrared spectra and UV-Vis spectral process as well conductivity and magnetic quantifications. Nature of compounds produced have been studied obeyed the mole ratio and continuous contrast methods, Beer's law followed during a concent
... Show MoreMS Elias, RGM AL-helfy, Plant Archives, 2019
China is moving towards building the largest economic power in the world, so what does this mean economically and politically for Europe, America, the Middle East and the Arab world? This project is called the expansionist Chinese Marshall Plan which is a revival of the old Silk Road in a new way. It represents the aspirations of the Chinese people and their president, Xi Jinping, to build a transport route from Asia to Europe and a railway plan to transport goods. The purpose of this is to develop the economic growth model, expand into new markets, promote the Chinese currency, and expand economic and political influence in the areas covered by the Chinese initiative. Equal opportunities in distributing investments to these countries, a
... Show MoreThis research focuses on the contemporary geostrategic transformations that afflicted the countries of the Middle East, with a focus on the countries of the Arab East, after the collapse of the system of international relations, and the emergence of the unipolar system led by the United States of America. After the events of September 11 and the events that followed, especially the occupation of Iraq in 2003, the study area witnessed a group of geopolitical variables and the emergence of dangerous phenomena that threatened the state structure in the countries of the Middle East; the most notably are the phenomenon of terrorism, cross-border armed groups, sectarian polarization, the phenomenon of migration and the internal and the externa
... Show MoreSince its inception, the theatrical performance has been based on the principle of permanence, continuity, renewal and innovation in the structure of its visual elements. These innovations and the effectiveness of continuity cannot be achieved without searching for everything that is new and different at the level (form and content) in order to create an image with innovative and effective features in the theatrical discourse, and from Among the elements of the theatrical performance (theatrical costumes) that have been subject to variation since the beginning of the theater until now, and for this purpose, the current research was conducted with the question of the research problem: What are the variations of costumes in the contemporar
... Show MoreThe evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show More