The aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics and supply chain management to reduce costs, times or improve services, In this study Three algorithms were proposed to solve the transport matrix (Range(R), Arithmetic Mean(AM), Cost Slop(CO)), and this algorithm must meet the requirements of problem restrictions and goals to reach good solutions, and may sometimes be the optimal solutions so we will adopt any solutions that are the best and optimal through our findings in the application of heuristic algorithms and based on the final results can be based on the heuristic method., The research concluded that the best reasoning method is the (arithmetic mean(AM)) because it gave the best results in reducing the total (cost and time) before and after the optimization method (MODI), It also gave the cost inclination method less total costs and time higher than the method of arithmetic mean After conducting the optimization method(MODI)
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreThe research deals with metaphors as being one of the primary means used by Lyudmila Ulitskaya when writing the novel " Sincerely Yours Shurik ", to form diverse and multifaceted collective female images of representatives of the classic psychological patterns presented in the work. This research reflects the results of the study related to the work of Lyudmila Yevkinevna Ulitskaya, an actress of modern Russian prose. The novel "The Sincerely to You Shorek" is one of Ludmila Ulitskaya's creations (the year of writing - 2003), which, like her other works, is distinguished by a unique presentation style, rich vocabulary, lexical and semantic diversity, and a special style of writing. writer. The main objective of the research is to look at th
... Show MoreThe strategies of knowledge management have became the basis in the promotion of core competencies. Therefore gained an increasing prominence. This led the administrations of organizations to work to effectiveness of there strategies, which results to build there core competences through teamwork, empowerment and personal effectiveness of employees. From this arises research problem about the organizations leaders recognize extent of knowledge management strategies which that lead to core competence. In addition the research tray definition the relation and nature of affect between its variables. The research was carried on sample (72) managers from board of supreme audit in Iraq and used statistical tools and methods.
... Show MoreGlobal warming has a serious impact on the survival of organisms. Very few studies have considered the effect of global warming as a mathematical model. The effect of global warming on the carrying capacity of prey and predators has not been studied before. In this article, an ecological model describing the relationship between prey and predator and the effect of global warming on the carrying capacity of prey was studied. Moreover, the wind speed was considered an influencing factor in the predation process after developing the function that describes it. From a biological perspective, the nonnegativity and uniform bounded of all solutions for the model are proven. The existence of equilibria for the model and its local stability is inves
... Show MoreA high-performance liquid chromatography method was employed for the quantitative determination of ascorbic acid (AA) which called vitamin C in three types of Iraqi citrus (orange mandarin and aurantium ) and to establish this goal , evaluation of ascorbic acid degradation is so important due to its significant criticality when exposure to ordinary atmospheric conditions. The chromatographic analysis of AA was carried out after their sequential elution with KH2PO4 ( as mobile phase) by reverse-phase HPLC technique with C8 column and UV detection at 214 nm. .Bad resolutions was appeared clearly for C8 column , so another alternative condition were carried out to improve the resolution by replacement of C8 by C18 column .Statistical treat
... Show MoreThis study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J
... Show MorePulsed laser ablation in liquid (PLAL) has become an increasingly important technique for metals production and metal oxides nanoparticles (NPs) and others. This technique has its many advantages compared with other conventional techniques (physical and chemical). This work was devoted for production of zirconia (ZrO2) nanoparticles via PLAL technique from a solid zirconium target immersed in a wet environment in order to study the effect of this environment on the optical properties and structure of ZrO2 nanoparticles. The solutions which used for this purpose is distilled water (D.W). The produces NPs were characterized by mean of many tests such as UV-visible (UV-Vis.), transmission electron microscope (TEM) and Z-Potential. The UV-Vis.
... Show MoreA non-polynomial spline (NPS) is an approximation method that relies on the triangular and polynomial parts, so the method has infinite derivatives of the triangular part of the NPS to compensate for the loss of smoothness inherited by the polynomial. In this paper, we propose polynomial-free linear and quadratic spline types to solve fuzzy Volterra integral equations (FVIE) of the 2nd kind with the weakly singular kernel (FVIEWSK) and Abel's type kernel. The linear type algorithm gives four parameters to form a linear spline. In comparison, the quadratic type algorithm gives five parameters to create a quadratic spline, which is more of a credit for the exact solution. These algorithms process kernel singularities with a simple techniqu
... Show More