In this paper we investigate the use of two types of local search methods (LSM), the Simulated Annealing (SA) and Particle Swarm Optimization (PSO), to solve the problems ( ) and . The results of the two LSMs are compared with the Branch and Bound method and good heuristic methods. This work shows the good performance of SA and PSO compared with the exact and heuristic methods in terms of best solutions and CPU time.
In this paper, the effective computational method (ECM) based on the standard monomial polynomial has been implemented to solve the nonlinear Jeffery-Hamel flow problem. Moreover, novel effective computational methods have been developed and suggested in this study by suitable base functions, namely Chebyshev, Bernstein, Legendre, and Hermite polynomials. The utilization of the base functions converts the nonlinear problem to a nonlinear algebraic system of equations, which is then resolved using the Mathematica®12 program. The development of effective computational methods (D-ECM) has been applied to solve the nonlinear Jeffery-Hamel flow problem, then a comparison between the methods has been shown. Furthermore, the maximum
... Show MorePurpose: The main objective of this paper is, to determine the optimal no. of technicians’ men in a workshop crew of an Industrial System. Theoretical framework: The purpose of applying these tools is to explore their ability to reduce costs and improvements that can be obtained in the process of providing services to the end customer. Design/methodology/approach: The literature structure review was built from analyzing 12 of scientific papers and books, from web sciences and the Elsevier database. The papers were analyzed from descriptive, methodologic, and citation characteristics. Finding: By applying the equation model of the paper, the optimal no. of technician men in the crew of the workshop can be determined when
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe present study is the first taxonomic study on scorpions in Iraq. The specimens were collected from regions in the middle and south of Iraq, three families, seven genera and eight species were recorded for the first time in Iraq and one new species of the world.
The purpose of this study is to identify the extent of the EFL teachers’ implementationoftotal quality management (TQM)principles through teaching English as a foreign language in Iraqi secondary schools.A total of 180 EFL teachers fromsecondary schools in Baghdad during the academic year 2010/ 2011 participated in the study. Data was collected using a scale to identify the extent of implementation of total quality management principles by 140 EFL teachers in their classroom. To support the data collected from the scale,40 teachers were observed by EFL educational supervisors during their lessons. The collected data was analyzed using frequency, means and standard deviation to identify the extent of implementation of (TQM) principles.
... Show MoreThis work aims to analyze a three-dimensional discrete-time biological system, a prey-predator model with a constant harvesting amount. The stage structure lies in the predator species. This analysis is done by finding all possible equilibria and investigating their stability. In order to get an optimal harvesting strategy, we suppose that harvesting is to be a non-constant rate. Finally, numerical simulations are given to confirm the outcome of mathematical analysis.
Objective: The present study aimed to shed light on the role of narghileh and cigarette smoking on immunity status of oral cavity by assess (C3 complement component, Immunoglobulin A, Total protein, α-Amylase and EBV IgG antibody). Method: Saliva levels in two smokers groups the first include 28 narghileh smokers and the second include 32 narghileh and cigarette smokers as well as 30 non-smokers consider as control. Results: As compared control, the levels of C3, IgA and total protein were significantly decreased, and the highest decreased was observed in saliva of narghileh and cigarette smokers, the result was (C3= 0.400±0.194 µg vs. 9.728±3.561 µg; IgA= 2.460±0.492 mg/dl vs. 5.048±0.937 mg/dl; Total protein= 170.20±45.93 mg% vs.
... Show MoreSurveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion
Monthly rainfall data of Baghdad meteorological station were taken to study the time behavior of these data series. Significant fluctuation,very slight increasing trend and significant seasonality were noticed. Several ARIMA models were tested and the best one were checked for the adequacy. It is found that the SEASONAL ARIMA model of the orders SARIMA(2,1,3)x(0,1,1) is the best model where the residual of this model exhibits white noise property, uncorrelateness and they are normally distributed. According to this model, rainfall forecast for four years was also achieved and showing similar trend and extent of the original data.
In this paper, a numerical approximation for a time fractional one-dimensional bioheat equation (transfer paradigm) of temperature distribution in tissues is introduced. It deals with the Caputo fractional derivative with order for time fractional derivative and new mixed nonpolynomial spline for second order of space derivative. We also analyzed the convergence and stability by employing Von Neumann method for the present scheme.