The aim of the research is to apply fibrewise multi-emisssions of the paramount separation axioms of normally topology namely fibrewise multi-T0. spaces, fibrewise multi-T1 spaces, fibrewise multi-R0 spaces, fibrewise multi-Hausdorff spaces, fibrewise multi-functionally Hausdorff spaces, fibrewise multi-regular spaces, fibrewise multi-completely regular spaces, fibrewise multi-normal spaces and fibrewise multi-functionally normal spaces. Also we give many score regarding it.
This paper discusses an optimal path planning algorithm based on an Adaptive Multi-Objective Particle Swarm Optimization Algorithm (AMOPSO) for two case studies. First case, single robot wants to reach a goal in the static environment that contain two obstacles and two danger source. The second one, is improving the ability for five robots to reach the shortest way. The proposed algorithm solves the optimization problems for the first case by finding the minimum distance from initial to goal position and also ensuring that the generated path has a maximum distance from the danger zones. And for the second case, finding the shortest path for every robot and without any collision between them with the shortest time. In ord
... Show MoreResearchers have identified and defined β- approach normed space if some conditions are satisfied. In this work, we show that every approach normed space is a normed space.However, the converse is not necessarily true by giving an example. In addition, we define β – normed Banach space, and some examples are given. We also solve some problems. We discuss a finite β-dimensional app-normed space is β-complete and consequent Banach app- space. We explain that every approach normed space is a metric space, but the converse is not true by giving an example. We define β-complete and give some examples and propositions. If we have two normed vector spaces, then we get two properties that are equivalent. We also explain that
... Show MoreThe objective of this research work is to evaluate the quality of central concrete plant of Al-Rasheed Company by using Six Sigma approach which is a measure of quality that strives for near elimination of defects using the statistical methods to improve outputs that are critical to customers. The fundamental objective of Six Sigma methodology is the implementation of a measurement-based strategy that focuses on process improvement and variation reduction to reach delighting customers, and then suggesting an improvement system to improve the production of concrete in Al-Rasheed State Contracting Construction Company.
A field survey includes two parts (open and close questionnaire) that aimed to get the data and information required f
An efficient modification and a novel technique combining the homotopy concept with Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced in this paper . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.
Natural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are
... Show MoreThe university course timetable problem (UCTP) is typically a combinatorial optimization problem. Manually achieving a useful timetable requires many days of effort, and the results are still unsatisfactory. unsatisfactory. Various states of art methods (heuristic, meta-heuristic) are used to satisfactorily solve UCTP. However, these approaches typically represent the instance-specific solutions. The hyper-heuristic framework adequately addresses this complex problem. This research proposed Particle Swarm Optimizer-based Hyper Heuristic (HH PSO) to solve UCTP efficiently. PSO is used as a higher-level method that selects low-level heuristics (LLH) sequence which further generates an optimal solution. The proposed a
... Show MoreA simple, accurate, precise, rapid, economical and a high sensitive spectrophotometric method has been developed for the determination of tadalafil in pharmaceutical preparations and industrial wastewater samples, which shows a maximum absorbance at 204 nm in 1:1 ethanol-water. Beer's law was obeyed in the range of 1-7?g/ mL ,with molar absorptivity and Sandell ? s sensitivity of 0.783x105l/mol.cm and 4.97 ng/cm2respectively, relative standard deviation of the method was less than 1.7%, and accuracy (average recovery %) was 100 ± 0. 13. The limits of detection and quantitation are 0.18 and 0.54 µg .ml-1, respectively. The method was successfully applied to the determination of tadalafil in some pharmaceutical formulations
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show More