Scheduling Timetables for courses in the big departments in the universities is a very hard problem and is often be solved by many previous works although results are partially optimal. This work implements the principle of an evolutionary algorithm by using genetic theories to solve the timetabling problem to get a random and full optimal timetable with the ability to generate a multi-solution timetable for each stage in the collage. The major idea is to generate course timetables automatically while discovering the area of constraints to get an optimal and flexible schedule with no redundancy through the change of a viable course timetable. The main contribution in this work is indicated by increasing the flexibility of generating optimal timetable schedules with different copies by increasing the probability of giving the best schedule for each stage in the campus with the ability to replace the timetable when needed. The Evolutionary Algorithm (EA) utilized in this paper is the Genetic Algorithm (GA) which is a common multi-solution metaheuristic search based on the evolutionary population that can be applied to solve complex combinatorial problems like timetabling problems. In this work, all inputs: courses, teachers, and time acted by one array to achieve local search and combined this acting of the timetable by using the heuristic crossover to ensure that the essential conditions are not broken. The result of this work is a flexible scheduling system, which shows the diversity of all possible timetables that can be created depending on user conditions and needs.
The research objective are analyze financial leverage advantage through analyze and discuss financial leverage cost, and achieve tax advantage. study include two firms ,oil firm and industrial companies firm with limited liability.The inductive method is used for the applied part in analyzing the financial data of the companies considered in 2011-2015.The result of the study shows that the financial leverage achieve present value of the costs is Negative . The study concluded that the most important conclusions of the tax advantage of leverage is higher costs as well as achieving a low tax shield ,This study found out the results that interest payments related to pre-tax all of the loan amount and the percentage of the interest rate on b
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe Purpose of this study are analyze financial lease advantage through analyze and discuss financial lease cost, and achieve tax advantage to reach study objective. study include two firms ,oil firm and construction firm with limited liability. The inductive method is used for the applied part in analyzing the financial data of the companies considered in 2011-2015.The result of the study shows that the financial lease achieve present value of the costs is positive. This study found out the results that verify the hypothesis: The tax advantage of financial Leasing is characterized by decreasing cost and achieving higher tax shield. The study also found the most important recommendations of awareness of the benefits arising f
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreThe aim of the research is to identify the methods of achieving mental health from an Islamic perspective by using an analytical approach. The methods that were explained: strengthen the spiritual side to control the motives and emotion s overcome the whims of the soul, fear of God and treat mental illness from an Islamic point of view by recognizing self, assurance, foresight, learning and acquiring new trends. Conclusion: we can achieve mental health by optimism, not despair, the compatibility of the Muslim with himself and with others, Consistency, emotional balance, and patience in difficult situations. Islam has attributes that make an individual feels psychological security. Thus, all these elements achiev
... Show MoreA real method of predication brake pad wear ,could lead to substantiol economies of time and money. This paper describes how such a procedure has been used and gives the results to establish is reliability by comparing the predicted wear with that which actually occurs in an existing service. The experimental work was carried out on three different commercial samples ,tested under different operation conditions (speed,load,time...etc)using a test ring especially modified for this purpose. Abrasive wear is mainly studied , since it is the type of wear that takes place in such arrangements. Samples wear tested in presences of sand or mud between the mating surfaces under different operational conditions of speed, load and braking time .Mec
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Ecolinguistics is a twofold field in which ecology and language are its two major concerns. That is, this field is concerned with the way through which our thoughts, ideologies and the like influence the environment. The present study aims at analyzing (6) constructive and destructive environmental advertisements to find out how the techniques of erasure and salience operate in these types of advertisements. It studies the linguistic expressions that achieve these techniques in the constructive and destructive advertisements. The qualitative and quantitative methods are exploited in the current study. Analyzing (6) constructive and destructive environmental advertisements in accordance with Stibbe’s (2015) model of salience and erasure
... Show MoreThe ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the
... Show MoreThe aim of this article is to study the dynamical behavior of an eco-epidemiological model. A prey-predator model comprising infectious disease in prey species and stage structure in predator species is suggested and studied. Presumed that the prey species growing logistically in the absence of predator and the ferocity process happened by Lotka-Volterra functional response. The existence, uniqueness, and boundedness of the solution of the model are investigated. The stability constraints of all equilibrium points are determined. The constraints of persistence of the model are established. The local bifurcation near every equilibrium point is analyzed. The global dynamics of the model are investigated numerically and confronted with the obt
... Show More