Given a matrix, the Consecutive Ones Submatrix (C1S) problem which aims to find the permutation of columns that maximizes the number of columns having together only one block of consecutive ones in each row is considered here. A heuristic approach will be suggested to solve the problem. Also, the Consecutive Blocks Minimization (CBM) problem which is related to the consecutive ones submatrix will be considered. The new procedure is proposed to improve the column insertion approach. Then real world and random matrices from the set covering problem will be evaluated and computational results will be highlighted.
The Assignment model is a mathematical model that aims to express a real problem facing factories and companies which is characterized by the guarantee of its activity in order to make the appropriate decision to get the best allocation of machines or jobs or workers on machines in order to increase efficiency or profits to the highest possible level or reduce costs or time To the extent possible, and in this research has been using the method of labeling to solve the problem of the fuzzy assignment of real data has been approved by the tire factory Diwaniya, where the data included two factors are the factors of efficiency and cost, and was solved manually by a number of iterations until reaching the optimization solution,
... Show More
This study is concerned with shedding light on the grammatical method of Ibn Hisham Al-Ansari (761 AH), in his explanation of Bant Souad’s poem by the poet Kaab bin Zuhair, and I included a brief description of Ibn Hisham’s life with a number of explanations of this poem, then clarified the most important features of this method The grammar represented by his reliance on hearing and presenting it to analogy with mention of types of analogy, as well as his attribution of opinions to their owners with weighting, selection and balancing, and his attention to reasoning and a number of grammatical ailments, and his approach is also distinguished by following the method of fractal.
... Show More
The self-evident truth existing in today's business environment is the continuity of change and its continuity and turmoil, also its increase over time as it is more abundant, abundant, wide and complex than ever before, and it is the dominant feature in the business environment, as different organizations and operating units can find themselves shifting from the top to the bottom. And then it requires its departments to strive to adapt to these rapid and turbulent shifts and changes by bringing about a series of organizational and adaptive changes that are not limited to one organizational aspect only but rather include all organizational components. Accordingly, this research came to determine the readiness of public organizations to chan
... Show MoreResearch Hypothesis from the fact that kicks off the effect that agricultural production in Iraq plays an important role in overcoming the food problem and achieving food security, but he became far far away from the provision of sufficient quantities of food products and then securing the Iraqi consumer food basket by the challenges faced by the agricultural sector.
To prove the hypothesis research in its structure in three axes came, the first axis eating historical significance to the subject of food over time periods as well as to clarify the concept of food security, and the second axis touched on the most important challenges facing the agricultural sector in Iraq and prevent the achievement of food requirements for members of
The Islamic Issue did not rise the “widespread arguments” in contemporary times, just as the issue of applying Islamic Law. Just as the Islamic forces used this purpose, or employed it during their march to reach to power by adopting the sacred as motivation towered the power, or control the governance. However, the reality show that this goal remained within the boundaries of slogans in the sense of a teleological slogan, and did not go beyond the limits of advocacy or arrangement as the primary source of legislation with differences of teleological reasoning, in a manner that reflected an intellectual problem about the validity of the use of this concept or the ability to apply and enforce the law in today's world, to impose
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the