This paper presents a hybrid metaheuristic algorithm which is Harmony-Scatter Search (HSS). The HSS provides Scatter Search (SS) with random exploration for search space of problem and more of diversity and intensification for promising solutions. The SS and HSS have been tested on Traveling Salesman Problem. A computational experiment with benchmark instances is reported. The results demonstrate that the HSS algorithm produce better performance than original Scatter Search algorithm. The HSS in the value of average fitness is 27.6% comparing with original SS. In other hand the elapsed time of HSS is larger than the original SS by small value. The developed algorithm has been compared with other algorithms for the same problem, and the result was competitive with some algorithm and insufficient with another.
The Purpose of this Research show gap between a Normal Cost System and Resource consumption Accounting Applied in AL-Rafidin Bank.
The Research explores that, how the idle capacity can be determined under resource consumption accounting, discuss the possibility of employing these energies. Research also viewed how costs can be separated into Committee and Attribute. Resource Consumption Accounting assists managers in pricing services or products based on what these services or products use from each Source.
This Research has been proven
The research concern about the conceptual framework of crisis in the strategic view has become to mean opportunity to change not threat only. The research explains the multi stages of crisis & its characteristics that are difference from catastrophe and disaster. We rely on two criteria of classification of crisis (predictability & influence possibilities). Also there are sub crises with the main crisis; the important one is the Maida Crisis which is related with the informational dimension & the Psychological Crisis which is related with the Human dimension or the victim management. The current research aimed to develop crises management strategy according to Islamic perspective based on model of ( Augustine, 1995).&
... Show MoreRecently, Social Sustainability has gained significant value as it was considered by the late studies as a principal dimension along with the environmental and economic sustainability. And because of, on the other hand, the significant social role of the school for forming the student’s personality, this research is an appeal for rehabilitating and promoting Iraqi Schools according the issue of social sustainability.As there is no evaluation for the Iraqi Schools, the research is dedicated to this problem, aiming to carry out the stated evaluation and define the design treatments needed for the rehabilitation process. To achieve this goal, a theoretical background for the concept of social sustainability, its criteria, the school and i
... Show MoreAbstract Objective (s): To identify the prevalence of obesity and overweight in infants and children less than 2 years of age and its relationship with type of feeding in a sample of children attending Al- Kadhymia primary health care center. Methodology: This study was a descriptive survey carried out in, the primary health care centre of Al-Kadhymia town in Baghdad during the period from 5th of July 2009-1st of May 2010. Sample was chosen by non probability convenience sampling and it included 744 infant and children. Data were gathered by a combination of a structured questionnaire and measurements o
X-ray diffractometers deliver the best quality diffraction data while being easy to use and adaptable to various applications. When X-ray photons strike electrons in materials, the incident photons scatter in a direction different from the incident beam; if the scattered beams do not change in wavelength, this is known as elastic scattering, which causes amplitude and intensity diffraction, leading to constructive interference. When the incident beam gives some of its energy to the electrons, the scattered beam's wavelength differs from the incident beam's wavelength, causing inelastic scattering, which leads to destructive interference and zero-intensity diffraction. In this study, The modified size-strain plot method was used to examin
... Show MoreThis paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).
The aim of this research is to adopt a close range photogrammetric approach to evaluate the pavement surface condition, and compare the results with visual measurements. This research is carried out on the road of Baghdad University campus in AL-Jaderiyiah for evaluating the scaling, surface texture for Portland cement concrete and rutting, surface texture for asphalt concrete pavement. Eighty five stereo images of pavement distresses were captured perpendicular to the surface using a DSLR camera. Photogrammetric process was carried out by using ERDAS IMAGINE V.8.4. The results were modeled by using a relationship between the photogrammetric and visual techniques and selected the highest coefficient of determinatio
... Show MoreEntrepreneurship, from a few years ago, is considered as a determining factor of the economic performances in the countries sending development. Its structural role and the dynamism it impels in all economies is no more established. For this reason, in this paper we proposed to use a methodology based on entrepreneurial and information systems for management master students in Ibn Zohr University Morocco. This methodology permit to facilitate to create the proper project in different disciplinary fields.
Nowadays, all agents insist on the development of entrepreneurship as well as the creation of enterprises as a catalyst for global economic growth. In this spirit, the development of the culture of business creation among students is
Email is one of the most commonly utilized communication methods. The confidentiality, the integrity and the authenticity are always substantial in communication of the e-mail, mostly in the business utilize. However, these security goals can be ensured only when the cryptography is utilized. Cryptography is a procedure of changing unique data into a configuration with the end goal that it is just perused by the coveted beneficiary. It is utilized to shield data from other individuals for security purposes. Cryptography algorithms can be classified as symmetric and asymmetric methods. Symmetric methods can be classified as stream cipher and block cipher. There are different operation modes provided by the block cipher, these are Cipher B
... Show More