In this research was to use the method of classic dynamic programming (CDP) and the method of fuzzy dynamic programming (FDP) to controlling the inventory in N periods and only one substance ,in order to minimize the total cost and determining the required quantity in warehouse rusafa principal of the ministry of commerce . A comparison was made between the two techniques، We found that the value of fuzzy total cost is less than that the value of classic total cost
The aim of the research is to design educational software based on Web Quests and to measure its effectiveness in developing information search skills of students at the Department of Educational and Psychological Sciences. The research is experimental in nature using pre-post measurement. The research sample consisted of (91) male and female students from the second grade in the Department of Educational and Psychological Sciences, they were divided into two equal groups; the experimental group consisted of (47) students who adopted the educational software as a studying method, and the control group consisted of (44) students who follow the traditional method. The researchers prepared a list of skills for searching information and they
... Show MoreObjective(s): To evaluate nurses' practices who work in respiratory intensive care units to control the
complications of patients admitted at this unit and determine the relationship between nurses' sociodemographic
characteristics and their practices.
Methodology: A descriptive study was carried out at Respiratory Care Unit at Baghdad teaching hospitals that
started from February 22th, 2013 to August 30th, 2013. A purposive "non-probability" sample of (70) nurses who
work in Respiratory Care Unit was selected from Baghdad teaching hospitals. The data were collected through the
use of constructed questionnaire that consists of two parts; (l) Demographic data form that consists of 7items and
(2) nurses' practice form
In this paper Heun method has been used to find numerical solution for first order nonlinear functional differential equation. Moreover, this method has been modified in order to treat system of nonlinear functional differential equations .two numerical examples are given for conciliated the results of this method.
This study was conducted in the College of Agriculture fields /University of Baghdad, during Autumn 2013. This study was aimed to examine the mortality rate on the all black fly stages of Acaudalerodes rachipora Singh) by the biotic fungus Beuveria bassiana. The results of a preliminary survey showed that the samples of Ziziphus spaina christi were infested by blakflies in Agriculture collage during Autumn seasons of 2013 , the presence of species of black flies A. rachipora on the lower surface of the leaf, the study aimed to study and research the effects of fungus B. bassiana on black fly A. rachipora. After six days of treatment results showed the continued superiority 106 spore / ml trends in the western, southern and
... Show MoreIn this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.
Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show More