Future generations of wireless networks are expected to heavily rely on unmanned aerial vehicles (UAVs). UAV networks have extraordinary features like high mobility, frequent topology change, tolerance to link failure, and extending the coverage area by adding external UAVs. UAV network provides several advantages for civilian, commercial, search and rescue applications. A realistic mobility model must be used to assess the dependability and effectiveness of UAV protocols and algorithms. In this research paper, the performance of the Gauss Markov (GM) and Random Waypoint (RWP) mobility models in multi-UAV networks for a search and rescue scenario is analyzed and evaluated. Additionally, the two mobility models GM and RWP are descr
... Show MoreThe university course timetable problem (UCTP) is typically a combinatorial optimization problem. Manually achieving a useful timetable requires many days of effort, and the results are still unsatisfactory. unsatisfactory. Various states of art methods (heuristic, meta-heuristic) are used to satisfactorily solve UCTP. However, these approaches typically represent the instance-specific solutions. The hyper-heuristic framework adequately addresses this complex problem. This research proposed Particle Swarm Optimizer-based Hyper Heuristic (HH PSO) to solve UCTP efficiently. PSO is used as a higher-level method that selects low-level heuristics (LLH) sequence which further generates an optimal solution. The proposed a
... Show MoreRecent advances in wireless communication systems have made use of OFDM technique to achieve high data rate transmission. The sensitivity to frequency offset between the carrier frequencies of the transmitter and the receiver is one of the major problems in OFDM systems. This frequency offset introduces inter-carrier interference in the OFDM symbol and then the BER performance reduced. In this paper a Multi-Orthogonal-Band MOB-OFDM system based on the Discrete Hartley Transform (DHT) is proposed to improve the BER performance. The OFDM spectrum is divided into equal sub-bands and the data is divided between these bands to form a local OFDM symbol in each sub-band using DHT. The global OFDM symbol is formed from all sub-bands together using
... Show MoreIn unpredicted industrial environment, being able to adapt quickly and effectively to the changing is key in gaining a competitive advantage in the global market. Agile manufacturing evolves new ways of running factories to react quickly and effectively to changing markets, driven by customized requirement. Agility in manufacturing can be successfully achieved via integration of information system, people, technologies, and business processes. This article presents the conceptual model of agility in three dimensions named: driving factor, enabling technologies and evaluation of agility in manufacturing system. The conceptual model was developed based on a review of the literature. Then, the paper demonstrates the agility
... Show MoreIn this research, the multi-period probabilistic inventory model will be applied to the stores of raw materials used in the leather industry at the General Company for Leather Industries. The raw materials are:Natural leather includes cowhide, whether imported or local, buffalo leather, lamb leather, goat skin, chamois (raw materials made from natural leather), polished leather (raw materials made from natural leather), artificial leather (skai), supplements which include: (cuffs - Clocks - hands - pockets), and threads.This model was built after testing and determining the distribution of demand during the supply period (waiting period) for each material and completely independently from the rest of the materials, as none of the above mate
... Show MoreHeuristic Program proposal for the treatment of talented emotional and Cognitive problems .
1-The Curtent research aims : to identify the needs of gifted students and their problems and Ways to diagnose .
2-reprepare aproposal heuristic program for the treatment of emotional and Cognitive talented problems .
Research . Methodology : analytical and descriptive .
Define the terms
Virt uoso is the per for mance of the privileged Mstmrave performances appear in any area of his Values .
Chapter ll : Includes recipes gifted child and Methods diagnosis gifted by filtrontion and standavds of personal and mental and behavioral Doramwaliman and parental Features and Leader in the detection of the gif
... Show MoreThe research aims at integrating the disclosure of the business models with the qualitative characteristics of accounting information. To achieve this, the elements of the business model should be identified and disclosed, and then study the possibility of integrating the disclosure of the business model with the qualitative characteristics of accounting information.
To achieve this objective, the research was based on the indicators of disclosure of the business model of the International Accounting Standards Board to measure the disclosure of the business model.
The research reached a number of conclusions, the most important of which were as follows:
Fi
... Show MoreThe emphasis of Master Production Scheduling (MPS) or tactic planning is on time and spatial disintegration of the cumulative planning targets and forecasts, along with the provision and forecast of the required resources. This procedure eventually becomes considerably difficult and slow as the number of resources, products and periods considered increases. A number of studies have been carried out to understand these impediments and formulate algorithms to optimise the production planning problem, or more specifically the master production scheduling (MPS) problem. These algorithms include an Evolutionary Algorithm called Genetic Algorithm, a Swarm Intelligence methodology called Gravitational Search Algorithm (GSA), Bat Algorithm (BAT), T
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show More