Simulated annealing (SA) has been an effective means that can address difficulties related to optimization problems. is now a common discipline for research with several productive applications such as production planning. Due to the fact that aggregate production planning (APP) is one of the most considerable problems in production planning, in this paper, we present multi-objective linear programming model for APP and optimized by . During the course of optimizing for the APP problem, it uncovered that the capability of was inadequate and its performance was substandard, particularly for a sizable controlled problem with many decision variables and plenty of constraints. Since this algorithm works sequentially then the current state will generate only one in next state that will make the search slower and the drawback is that the search may fall in local minimum which represents the best solution in only part of the solution space. In order to enhance its performance and alleviate the deficiencies in the problem solving, a modified (MD) is proposed. We attempt to augment the search space by starting with solutions, instead of one solution. To analyses and investigate the operations of the MSA with the standard and harmony search (HS), the real performance of an industrial company and simulation are made for evaluation. The results show that, compared to and , offers better quality solutions with regard to convergence and accuracy.
A sensitive spectrofluorimetric method for the determination of glibenclamide in its tablet formulations has been proposed. The method is based on the dissolving of glibenclamide in absolute ethanol and measuring the native fluorescence at 354 nm after excitation at 302 nm. Beers law is obeyed in the concentration of 1.4 to 10 µg.ml-1 of glibenclamide with a limit of detection (LD) of 0.067 µg.ml-1 and a standard deviation of 0.614. The range percent recoveries (N=3) is 94 - 103.
Conducted two trials separate plants Defla first two seasons, 1998 and 1999 to test the susceptibility Altgveria three varieties including Azharha colored white and pink Qati and pink Qtmr and second seasons 1999 and 2000, two types color Azhaarhama white and pink Qati treated mind half-timbered two types of Alaoxinat IBA and NAA and three concentrations as well as repeatersAdhrt results low Almaah rooting
A computational investigation has been carried out on the design and properties of the electrostatic mirror. In this research, we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The electron beam path under zero magnification condition had been investigated as mirror trajectory with the aid of fourth – order – Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements, i.e. each optical element in optical system has suffer from the chromatic aberration, for this case, it is use to operate the mirror in optical system at various values
... Show MoreAbstract
One of the major components in an automobile engine is the throttle valve part. It is used to keep up with emissions and fuel efficiency low. Design a control system to the throttle valve is newly common requirement trend in automotive technology. The non-smoothness nonlinearity in throttle valve model are due to the friction model and the nonlinear spring, the uncertainty in system parameters and non-satisfying the matching condition are the main obstacles when designing a throttle plate controller.
In this work, the theory of the Integral Sliding Mode Control (ISMC) is utilized to design a robust controller for the Electronic Throttle Valve (ETV) system. From the first in
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreIn this paper, a mathematical model was built for the supply chain to reduce production, inventory, and transportation in Baghdad Company for Soft Drink. The linear programming method was used to solve this mathematical model. We reduced the cost of production by reduced the daily work hours, the company do not need the overtime hours to work at the same levels of production, and the costs of storage in the company's warehouses and agents' stores have been reduced by making use of the stock correctly, which guarantees reducing costs and preserving products from damage. The units transferred from the company were equal to the units demanded by the agents. The company's mathematical model also achieved profits by (84,663,769) by re
... Show MoreThis paper addresses the use of adaptive sliding mode control for the servo actuator system with friction. The adaptive sliding mode control has several advantages over traditional sliding mode control method. Firstly, the magnitude of control effort is reduced to the minimal admissible level defined by the conditions for the sliding mode to exist. Secondly, the upper bounds of uncertainties are not required to be known in advance. Therefore, adaptive sliding mode control method can be effectively implemented. The numerical simulation via MATLAB 2014a for servo actuator system with friction is investigated to confirm the effectiveness of the proposed robust adaptive sliding mode control scheme. The results clarify, after
... Show MoreAbstract: Israel formulated its security theory, which it established on the "pretext of war", meaning converting any Arab action that Israel deems a threat to its security, into a pretext to ignite the fuse of war, considering this a violation of an existing situation, and then it initiates preventive and pre-emptive attacks, then immediately turns into transfer the war to the enemy's land, to achieve a quick solution by (destroying the enemy), occupying its lands, and benefiting of the advantage of working on (internal lines against an enemy) working on external lines, and ending the war quickly, before the major powers intervene to impose a ceasefire
The research paper deals with the role of the place making in eco-tourism through a review of international experiences in the eco-tourism industry and its contribution to advancing the reality of tourism there, and attracting the largest number of tourists. The study is divided into five axes: the first is a study of related concepts, and the second is a study of global experiences, which included three countries: (South Bank (Gabriel's Wharf) - London, Rotterdam in the Netherlands, and dealt with each of Happy Streets and Kendrick Mills, and then the Perak River tourist corridor - Malaysia). As for the third axis, it is concerned with analyzing these experiences to reach th
... Show More