Geographic Information Systems (GIS) are obtaining a significant role in handling strategic applications in which data are organized as records of multiple layers in a database. Furthermore, GIS provide multi-functions like data collection, analysis, and presentation. Geographic information systems have assured their competence in diverse fields of study via handling various problems for numerous applications. However, handling a large volume of data in the GIS remains an important issue. The biggest obstacle is designing a spatial decision-making framework focused on GIS that manages a broad range of specific data to achieve the right performance. It is very useful to support decision-makers by providing GIS-based decision support systems that significantly reduce the cost involved when moving between two locations. Therefore, in this paper, an advanced decision support system is built for identifying the best route between two locations according to various criteria such as distance, travel time, the safety of the road, and other features. The proposed model includes several stages; Google Maps downloading, preprocessing, integrating with the database, and identifying the best route by utilizing advanced algorithms of artificial intelligence. Furthermore, the Open Street Maps (OSM) database is utilized in this model and implemented using the Quantum Geographic Information Systems (QGIS) platform. One of the main merits of this model is to be faster by removing the influence of non-processed data like null values and unlinked roads on offline google maps levels. The outcomes of this proposed model display the best route which connects the source with the destination, and a table including the entire information for this route.
Periodontitis is a multifactorial chronic inflammatory disease that affects tooth-supporting soft/hard tissues of the dentition. The dental plaque biofilm is considered as a primary etiological factor in susceptible patients; however, other factors contribute to progression, such as diabetes and smoking. Current management utilizes mechanical biofilm removal as the gold standard of treatment. Antibacterial agents might be indicated in certain conditions as an adjunct to this mechanical approach. However, in view of the growing concern about bacterial resistance, alternative approaches have been investigated. Currently, a range of antimicrobial agents and protocols have been used in clinical management, but these remain largely non-v
... Show MoreLasmiditan (LAS) was formulated as a nanoemulsion based in situ gel (NEIG)with the aim of improving its oral bioavailability via application intranasally. The solubility of LAS in oils, emulsifiers, and co-emulsifiers was determined to identify nanoemulsion (NE)components. Phase diagrams were constructed to identify the area of nanoemulsification. LAS NE was formulated using the spontaneous nanoemulsification method. Four NEs (F19, F24, F31, and F34) containing 7-15 % oleic acid (OA) as an oily phase, 40-55% labrasol (LR), and transcutol (TC) as emulsifier mixture at (1:1), (2:1), (3:1), and (1:2) ratio with 30-53 % (w/w) aqueous phase, having suitable optical transparency of 95–98%, globule size of 104-140 nm and polydisper
... Show MoreIn this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste
This paper presents a cognition path planning with control algorithm design for a nonholonomic wheeled mobile robot based on Particle Swarm Optimization (PSO) algorithm. The aim of this work is to propose the circular roadmap (CRM) method to plan and generate optimal path with free navigation as well as to propose a nonlinear MIMO-PID-MENN controller in order to track the wheeled mobile robot on the reference path. The PSO is used to find an online tune the control parameters of the proposed controller to get the best torques actions for the wheeled mobile robot. The numerical simulation results based on the Matlab package show that the proposed structure has a precise and highly accurate distance of the generated refere
... Show Moreه رثا قيقحتلو ،ةيبساحملا تامولعملا ةميق ةمئلام يف قيقدتلا ةنجلل ةيبساحملاو ةيلاملا ةربخلاو ةيللاقتسلاا ثحبلا تايضرف رابتخلا ةمزلالا تانايبلا عمجل ةنابتسا ةرامتسا مادختساب ةثحابلا تماق ةساردلا فده ةللاد وذ رثأ دجوي(يهو ةيبساحملاو ةيلاملا ةربخلل ةيئاصحإ ةللاد وذ رثا دجوي( ، )ةيبساحملا تامولعملا ةميق ةمئلام ىلع قيقدتلا ةنجل ةيللاقتسلا ةيئاصحا )ةيبساحملا تامولعملا ةميق ةمئلام ىلع ( نم تنوكت ةنيع ىلع تعزو ث
... Show Moreيكتسب موضوع تدريب وتطوير العاملين أهمية بالغة في الظروف الاقتصادية الحالية التي تسودها مفاهيم وتوجهات جديدة كعولمة الاقتصاد ورأس المال المعرفي والفكري، وحيث صارت المعارف والمهارات والقابليات التي يمتلكها العاملون محركاً أساسياً باتجاه النجاح، وعنصراً مهماً في زيادة فاعلية منشأة الأعمال، وإدامة وجودها واستمرارها.
إن العاملين المدربين بشكل جيد على عمليات المنشأة وطبيعة المواد التي تستخدمها وإنتاجه
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More