In this paper, two of the local search algorithms are used (genetic algorithm and particle swarm optimization), in scheduling number of products (n jobs) on a single machine to minimize a multi-objective function which is denoted as (total completion time, total tardiness, total earliness and the total late work). A branch and bound (BAB) method is used for comparing the results for (n) jobs starting from (5-18). The results show that the two algorithms have found the optimal and near optimal solutions in an appropriate times.
Background: Diabetes mellitus and osteoporosis are two common medical disorders that are becoming more common as the population ages. T2DM patients have a higher fracture hazard, having a high BMD, which is primarily due to the raise hazard of falling. Macrophage colony-stimulating factor (M-CSF) is one of the hematopoietic growth factor family, and It plays an important function in fracture repair by attracting stem cells to the fracture site and influencing the production of hard calluses by promoting osteoclast genesis.Aims of study: The purpose of this research was to assess the blood level of macrophage colony-stimulating factor in Iraqi osteoporotic patients with and without type 2 diabetes. in addition, that M-CSF may be a predictiv
... Show MoreGender classification is a critical task in computer vision. This task holds substantial importance in various domains, including surveillance, marketing, and human-computer interaction. In this work, the face gender classification model proposed consists of three main phases: the first phase involves applying the Viola-Jones algorithm to detect facial images, which includes four steps: 1) Haar-like features, 2) Integral Image, 3) Adaboost Learning, and 4) Cascade Classifier. In the second phase, four pre-processing operations are employed, namely cropping, resizing, converting the image from(RGB) Color Space to (LAB) color space, and enhancing the images using (HE, CLAHE). The final phase involves utilizing Transfer lea
... Show MoreThe steel industry sector is witnessing an obvious growth in most worldwide nations and gulf countries. We wish that Iraq would be one of these superiors that go on along field to develop the construction industry in Iraq. Hence we need to notify that the government attention should be equivalent to the importance of steel industry and other industries would depend on this one, it should be presented the full support to the general sector, which is represented by ministry of industry and its institutions throughout the suitable legislation and facilities for the private companies are already into that, and they might record progress in this field. this study aims to use scrap steel as raw materials in manufacturing iron steel such war remai
... Show MoreThe integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreAbstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col
... Show MoreNowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreElectrochemical Grinding (ECG) process is a mechanically assisted electrochemical process for material processing. The process is able to successfully machine electrically conducting harder materials at faster rate with improved surface finish and dimensional control. This research studies the effect of applied current, electrolyte concentration, spindle speed and the gap between workpiece and tool on hardness and material removal rate during electrochemical grinding for stainless steel 316. The characteristic features of the electrochemical grinding process are explored through Taguchi-design-based experimental studies. The better hardness can be obtained at 10 A of the current, 150 g/l of the electrolyte concentration, 0.3 mm of gap an
... Show More