In this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better
The present research aimed to test the imagination of children, and may build sample consisted of (400) a baby and child, selected by random way of four Directorates (first Resafe, second Resafe ,first alkarkh , second alkarkh), in order to achieve the objective of research the tow researchers have a test of imagination and extract the virtual and honesty plants distinguish paragraphs and paragraphs and difficulty factor became the test consists of (32), statistical methods were used (Pearson correlation coefficient, coefficient of difficult passages, highlight paragraphs, correlation equation, an equation wrong Standard) the tow researchers have a number of recommendations and proposals.
In This paper, we introduce the associated graphs of commutative KU-algebra. Firstly, we define the KU-graph which is determined by all the elements of commutative KU-algebra as vertices. Secondly, the graph of equivalence classes of commutative KU-algebra is studied and several examples are presented. Also, by using the definition of graph folding, we prove that the graph of equivalence classes and the graph folding of commutative KU-algebra are the same, where the graph is complete bipartite graph.
يهتم هذا البحث بدراسة الأجوبة المسكتة,وهي أجوبة سريعة وحاسمة تقطع حجة الخصم وتفحمه وتغلقالحوار.وقد أرتكز البحث على منهجية تداولية تنظرإلى فاعلية الجواب المسكت في المحاورة وإنهائها من زواياإنجازية و حجاجية.وقد تكون البحث من ديباجة ممهدةوثلاثة مباحث.وسلطتالديباجةالممهدةالضوء علىمفهومالجواب المسكتوشيوعهفي كتب الأدبوالأخبارونوادر الكلاموكيف يمكن النظر لهبوصفه وحدة حوارية تنبنيمنها المحادثة؟أما المبحث ا
... Show MoreSubcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and
... Show MoreNanotechnology extends the limits of molecular diagnostics to the nanoscale. This study describes some of the details of how the body interacts with nanoparticles. Biological tests measuring the presence or activity of selected substances become quicker, more sensitive, and more flexible when certain nanoscale particles are put to work as tags. Particular emphasis is placed on the effects of surface changes on body-borne particles, their transport within the body, and the dose-response effect. Other considerations include the definition of "persistent" in the context of therapy, FDA scientific committees, and the need for nanoparticle tracking. In short, there have been dramatic changes in molecular and genetic research findings, as well as
... Show MoreBelgium is one of the countries that headed towards federalism through a peaceful transition, and over a few decades the country has witnessed deep transformations in its institutions, from a unified and central state in the early nineteenth century to a federal union, regional operations began since 1970 up and constitutionally established its diversity Linguistic and regional, the so -called "state reforms" have been implemented, which led to the emergence of political repercussions. The country has suffered about two decades ago, which caused many national governments that are considered to be among the Luxor in the modern political history of Belgium, However, institutional reforms to achieve the stability of the political system began,
... Show MoreThis study investigated the cubic intuitionistic fuzzy set of TM-algebra as a generalization of the cubic set. First, a cubic intuitionistic ideal and a cubic intuitionistic T-ideal are defined, followed by a discussion of their properties. Furthermore, the level set of a cubic intuitionistic TM-algebra is defined, and the relationship between a cubic intuitionistic level set and the cubic intuitionistic T-ideal is established. A novel definition of a cubic intuitionistic set under homomorphism is proposed, and several significant results are demonstrated.
Interface bonding between asphalt layers has been a topic of international investigation over the last thirty years. In this condition, a number of researchers have made their own techniques and used them to examine the characteristics of pavement interfaces. It is obvious that test findings won't always be comparable to the lack of a globally standard methodology for interface bonding. Also, several kinds of research have shown that factors like temperature, loading conditions, materials, and others have an impact on surface qualities. This study aims to solve this problem by thoroughly investigating interface bond testing that might serve as a basis for a uniform strategy. First, a general explanation of how the bonding strength
... Show MoreSeveral Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the eff
... Show More