The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.
The importance of the research lies in preparing exercises using a proposed device to learn the skill of thehuman wheel on a machine rug of ground movements of the artistic gymnastics. As for the research problem:Through the presence of the two researchers as teachers and observers of this sport in the gymnastics hall,they noticed that there is difficulty in the students’ performance of the skill of the round off on the machineof the mat of ground movements, according to the researchers’ opinion, the reason for this is that skillsare taught with the limited availability of assistive devices, as well as the lack of use of these devices inexercises according to biomechanical variables, although they facilitate the learning process
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThis world is moving towards knowledge economy which basically depends on knowledge and information. So, the economic units need to develop its financial reporting system which helps to provide useful information in timeliness for investors in accordance with the requirements of the knowledge economy and meets the needs of those investors. This research aims to revealing the reflects of knowledge economy on the approaches of financial reporting and suggesting a financial reporting model in the environment of knowledge economy, depending on combining the value approach with the events approach using database and communication technology and providing useful accounting information for all users regardless of
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th
... Show MoreThe Makhoul Dam project proposed to be established is considered one of the strategic projects in Iraq as it works to insurance large quantity of water spare in flood seasons, increase the storage capacity of the dams in Iraq, as well as increase food security. The Makhool Dam is located on Tigris River in Salah al-Din Governorate, and 8 km south of the meeting point of the Tigris River with the Lower Zab River. The lake area is about 256 km2. In this research, a mathematical model was prepared by using HEC-RAS Two Dimension Software to analyze the velocity patterns and water depths inside makhool dam reservoir at the highest operational water elevation, based on the designs prepared
In this paper, we will provide a proposed method to estimate missing values for the Explanatory variables for Non-Parametric Multiple Regression Model and compare it with the Imputation Arithmetic mean Method, The basis of the idea of this method was based on how to employ the causal relationship between the variables in finding an efficient estimate of the missing value, we rely on the use of the Kernel estimate by Nadaraya – Watson Estimator , and on Least Squared Cross Validation (LSCV) to estimate the Bandwidth, and we use the simulation study to compare between the two methods.
One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show More