While analytical solutions to Quadratic Assignment Problems (QAP) have indeed been since a long time, the expanding use of Evolutionary Algorithms (EAs) for similar issues gives a framework for dealing with QAP with an extraordinarily broad scope. The study's key contribution is that it normalizes all of the criteria into a single scale, regardless of their measurement systems or the requirements of minimum or maximum, relieving the researchers of the exhaustively quantifying the quality criteria. A tabu search algorithm for quadratic assignment problems (TSQAP) is proposed, which combines the limitations of tabu search with a discrete assignment problem. The effectiveness of the proposed technique has been compared to well-established a
... Show Moreهدفت الدراسة الحالية الى التعرف ما اذا كان هناك تقبل اجتماعي للتلاميذ بطيئي من قبل اقرانهم العاديين؟ وكذلك معرفة ما اذا كان هناك فروق ذات دلالة في التقبل الاجتماعي بين افراد عينة الدراسة على وفق المتغيرات الاتية:
أ- العمر (9-13)
ب- الجنس (ذكور –اناث)
ج- المرحلة الدراسية
د- الحالة الاقتصادية (جيدة –متوسطة –جيدة جدا)
ولغرض تحقيق اه
... Show MoreDecision making is vital and important activity in field operations research ,engineering ,administration science and economic science with any industrial or service company or organization because the core of management process as well as improve him performance . The research includes decision making process when the objective function is fraction function and solve models fraction programming by using some fraction programming methods and using goal programming method aid programming ( win QSB )and the results explain the effect use the goal programming method in decision making process when the objective function is
fraction .
To find out a simple and efficient equation to estimate maize ear grain weight on farm (in situ), twenty three maize crosses along with two synthetics were grown in the field. On the experimental farm of the Dept. of Field Crop Sci., College of Agric., Univ. of Baghdad, seeds of twenty five maize genotypes were grown in the fall season of 2013 with three replicates. At dough stage of the kernels, five naked ears of each experimental units were measured for length and maximum diameter. This will sum up 125 ears of the trial. The volumes of ears were calculated as cylinder (length× r2× 3.1416). Grain weight of all ears were determined after harvesting and drying to 15% grain moisture. A constant was calculated by dividing ear grain weight b
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreNanocrystalline ZnO/Zeolite type A composite was prepared by simple method of operation by . the precipitation of zinc oxide and loading on zeolite 5A in one step. Characterization was made by X-ray diffraction (XRD), X-ray fluorescence(XRF), N2 adsorption- desorption for BET surface area, and Atomic force microscopy (AFM). Results showed that zinc oxide was loaded on zeolite as noticed by the characteristic peaks and was of nano scale having an average diameter of 88.57nm. The percentage loading of ZnO on zeolite A was 28.37% and the surface area was 222m2/g. The activity of the prepared catalyst was examined in the desulfurization of double hydrogenated diesel fuel. The process was investigated in a
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More