Abstract
This research deals will the declared production planning operation in the general company of planting oils, which have great role in production operations management who had built mathematical model for correct non-linear programming according to discounting operation during raw materials or half-made materials purchasing operation which concentration of six main products by company but discount included just three products of raw materials, and there were six months taken from the 1st half of 2014 as a planning period has been chosen . Simulated annealing algorithm application on non-linear model which been more difficulty than possible solution when imposed restric
... Show MoreAchieving an accurate and optimal rate of penetration (ROP) is critical for a cost-effective and safe drilling operation. While different techniques have been used to achieve this goal, each approach has limitations, prompting researchers to seek solutions. This study’s objective is to conduct the strategy of combining the Bourgoyne and Young (BYM) ROP equations with Bagging Tree regression in a southern Iraqi field. Although BYM equations are commonly used and widespread to estimate drilling rates, they need more specific drilling parameters to capture different ROP complexities. The Bagging Tree algorithm, a random forest variant, addresses these limitations by blending domain kno
Background: Blood group system and the ability to taste phenylthiocarbamide (PTC) are the most studied traits in human genetics which have been extensively used in describing genetic variations among human populations around the world that may had an effect on dental caries. The aims of present study were to investigate the caries experience among students with different bitter taste threshold in relation to blood type. Materials and Methods: The sample of present study includes dental students female aged19-21 years. The diagnosis of dental caries was done according to the criteria of Manjia et al, 1989 recording decayed lesion by severity (D1-4) MFS. Furthermore, bitter taste sensitivity was measured according to PTC (phenylthiocarbamid
... Show MoreThe aim of the study is to identify the barriers to dietary compliance among diabetic patients.
Methodology: The sample of the study consist of 100 patients who were divided into two groups according to
the type of diabetes mellitus; type 1 (Insulin-dependent diabetic mellitus), and type n (Non-Insulin dependent
diabetes mellitus). Each group consists of 50 patient selected randomly at each visit to Al-Waffa center in Mosul
city during the period from (1-12-2005) to (1-2-2006).
The steps of the study include recording the different barriers for diabetic patients. The questionnaire
was used and special list was utilized for such purpose.
Results: The results shows that there were some barriers most common such as both
In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.
The first thing that comes to mind is the highly important question of whether there were some effects of human behavior and its fluctuations on the theories of the efficient market and the contemporary investment portfolio. According to what has been said by the proponents of these two theories; when the optimal return is realized, the efficiency of the market is achieved in terms of perfect information on prices and risk that supposed to be predetermined in a rational way.
he other question that imposed here is “at what time people should be rational in their investments in the security markets ?”. This means that investors are rational for their efforts devoted to utility maximization, which are p
... Show MoreFraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.
God urged to read the Holy Qur’an and to ponder it is commanded, and the Most High said: That they ponder over His verses and that those with insights remember ().
And this book that God Almighty sent down to the heart of His Prophet, peace and blessings be upon him, is as clear as the sun and the moon.
It is a book of guidance and the constitution of a nation that is the best nation brought forth for mankind, and God has taken care of its preservation as He said: We have sent down the Remembrance, and we are its guardians.
This has been chosen for this topic (Luqman's commandments to his son) for what we see today in our time and society from the loss of morals and values and the neglect of parents to their chi
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show More