The aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics and supply chain management to reduce costs, times or improve services, In this study Three algorithms were proposed to solve the transport matrix (Range(R), Arithmetic Mean(AM), Cost Slop(CO)), and this algorithm must meet the requirements of problem restrictions and goals to reach good solutions, and may sometimes be the optimal solutions so we will adopt any solutions that are the best and optimal through our findings in the application of heuristic algorithms and based on the final results can be based on the heuristic method., The research concluded that the best reasoning method is the (arithmetic mean(AM)) because it gave the best results in reducing the total (cost and time) before and after the optimization method (MODI), It also gave the cost inclination method less total costs and time higher than the method of arithmetic mean After conducting the optimization method(MODI)
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreHepatitis is one of the diseases that has become more developed in recent years in terms of the high number of infections. Hepatitis causes inflammation that destroys liver cells, and it occurs as a result of viruses, bacteria, blood transfusions, and others. There are five types of hepatitis viruses, which are (A, B, C, D, E) according to their severity. The disease varies by type. Accurate and early diagnosis is the best way to prevent disease, as it allows infected people to take preventive steps so that they do not transmit the difference to other people, and diagnosis using artificial intelligence gives an accurate and rapid diagnostic result. Where the analytical method of the data relied on the radial basis network to diagnose the
... Show MoreThe research aims to build a training program to develop the willpower in the kindergarten children. In order to achieve the objective of the research, the two researchers have developed a Training Program according to the following steps:
- Determining the general objective of the Training Program.
- Determining the behavioral objectives of the Training Program.
- Determining the content of the Training Program.
- Implementing the content of the Training Program sessions.
- Evaluating the Training Program.
The training program consisted of (15) sessions, each session included a set of parts (title, general objective, methods, time and place to implement the sessions, behavioral goals, tool
... Show MoreA field experiment was carried out to find out the effect of some herbicides(Pallas, Crash, U46) on the companion weed to three cultivars of the oat crop (Shefa, Hamel, and Pimula) and the yield and its components of these cultivars. The results showed the superiority of the two treatments of spraying weed herbicides (T1 and T2 ) by giving the best results, as they recorded the lowest number of weed plants after 30 days of spraying reached 1.44 and 1.67 plant/m2 . Besides, the lowest weed dry weight was 0.11 and 0.00 g/m2, and the highest inhibition percentage in dry weight was 98.44% and 100.0% of the two treatments, respectively. The treatment T2 was also superior by giving the highest control percentage of 93.28% compared to the compari
... Show MoreThe application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show MoreBackground:sThe aims of this study were to evaluate and compare the ability of three different techniques to obdurate simulated lateral canals, evaluate the effect of the main canal curvature on obturation of lateral canals and compare the gutta-percha penetration between coronal and apical lateral canals. Materials and methods: Resin blocks with 30 straight and 30 curved were used in this study. Each canal has two parallel lateral canals. The main canal has 0.3 mm apical diameter and 0.04 taper. The canals were divided into six groups according to canal curvature and obturation techniques used (n=10): Groups C1 and C2: straight and curved canals obturated with continuous wave technique using E&Q masterTM system. Groups O1 and O2: straight
... Show More