After Zadeh introduced the concept of z-number scientists in various fields have shown keen interest in applying this concept in various applications. In applications of z-numbers, to compare two z-numbers, a ranking procedure is essential. While a few ranking functions have been already proposed in the literature there is a need to evolve some more good ranking functions. In this paper, a novel ranking function for z-numbers is proposed- "the Momentum Ranking Function"(MRF). Also, game theoretic problems where the payoff matrix elements are z-numbers are considered and the application of the momentum ranking function in such problems is demonstrated.
In many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an
... Show MoreIn this research, the focus was on estimating the parameters on (min- Gumbel distribution), using the maximum likelihood method and the Bayes method. The genetic algorithmmethod was employed in estimating the parameters of the maximum likelihood method as well as the Bayes method. The comparison was made using the mean error squares (MSE), where the best estimator is the one who has the least mean squared error. It was noted that the best estimator was (BLG_GE).
In this research, the focus was placed on estimating the parameters of the Hypoexponential distribution function using the maximum likelihood method and genetic algorithm. More than one standard, including MSE, has been adopted for comparison by Using the simulation method
The issue of epistemology is one of the theological issues that were and still is a relentless pursuit of knowledge, knowing the true knowledge of certainty. Therefore, it formed a main focus because of its great importance expressing the deep desire of the human soul to explore the self and reality and answer all the questions that it may raise. Knowledge is the highest function. For man to exist.
Therefore, the establishment of epistemology was general in knowledge, a characteristic that was distinguished, as it is an ancient and renewed subject that is still being raised and raised, although there are many methods of treating it and sacred solutions to it. To finally prove its potentia
... Show MoreThis study aims at discussing the theoretical and applicable parts of the reading comprehension to help the teachers of Arabic. This study shows that the students have a general weakness in reading comprehension. The researcher handles issues related to reading comprehension and to practicing exercises of the training strategies such as: dialogue, discussion, discussion questions, continuous training, group works. Such skills will be used to analyze a poem to see the level of the students’ reading comprehension and to develop the students’ skills. The study answers two questions:
1- What is the reading comprehension from a theoretical perspective?
2- How can we develop the skills of the reading comprehension from the practical
Nearly, in the middle of 1970s the split-brain theory became the only theory that explains human creativity used in all fine art and art education schools. In fact, this theory- which appeared for first time in the middle of 1940s – faced many radical changes including its concepts and structures, and these changes affected both teaching art and art criticism. To update people awareness within art field of study, this paper reviews the split-brain theory and its relationship with teaching art from its appearance to its decay in 2013 and after.
The study tries to answer several questions posed by the subject, one of the important: How the Internet promotes rumor? And what are the most Internet applications that promote rumor? And the practical ways to reduce these negative? Using the process of in vestige and reading theoretical heritage available in this field, and inferred the numbers and statistics marked the uses of the Internet and its applications over recent years, and the characteristics of each these tools in the field of collection, processing, and dissemination of information
The research aims to (identify the applications of pedagogy in art education), the research community included, art education for the primary stage, so the community consisted of (8) main areas in art education, either the research sample was chosen, two main areas (objectives, and content), and included the research methodology (descriptive and analytical), the researcher built the research tool represented (the validity form of the tool) and presented to a group of experts to indicate its validity as well as to measure its stability, To show the results, the researcher used the percentage, and the researcher recommended - modifying the curriculum every period of time, such as every four years, others
The purpose of the study is to identify the teaching techniques that mathematics' teachers use due to the Brain-based learning theory. The sample is composed of (90) teacher: (50) male, (40) female. The results have shown no significant differences between male and female responses' mean. Additionally, through the observation of author, he found a lack of using Brain-based learning techniques. Thus, the researcher recommend that it is necessary to involve teachers in remedial courses to enhance their ability to create a classroom that raise up brain-based learning skills.
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More