Preferred Language
Articles
/
ijs-3091
Using Non-dominated Sorting Particle Swarm Optimization Algorithm II for Bi-objective Flow Shop Scheduling Problems
...Show More Authors

A hybrid particulate swarm optimization (hybrid) combination of an optimization algorithm of the particle swarm and a variable neighborhood search algorithm is proposed for the multi-objective permutation flow shop scheduling problem (PFSP) with the smallest cumulative completion time and the smallest total flow time. Algorithm for hybrid particulate swarm optimization (HPSO) is applied to maintain a fair combination of centralized search with decentralized search. The Nawaz-Enscore-Ham )NEH) heuristic algorithm in this hybrid algorithm is used to initialize populations in order to improve the efficiency of the initial solution. The method design is based on ascending order (ranked-order-value, ROV), applying the continuous PSO algorithm to the PFSP, introducing the external archive set storage Pareto solution, and using a hybrid strategy that combines strong dominance and aggregation distance to ensure the distribution of the solution set. We adopted the Sigma method and the roulette method, based on the aggregation distance, to select the global optimal solution. A variable neighborhood search algorithm was proposed to further search the Pareto solution in the external set. The suggested hybrid algorithm was used to solve the Taillard test set and equate the test results with the SPEA2 algorithm to check the scheduling algorithm’s efficacy.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The norms of Minnesota multi faces personality inventory (second edition) MMPI-2 and the sixteen personality factor questionnaire of catel (fifth edition)
...Show More Authors

The aim of the current study is to create special norms of the second edition of Minnesota multi faces personality inventory, and the fifth edition of the sixteen personality factor questionnaire of catel. To this end, the researcher applied the Minnesota multi faces personality inventory over a sample of (1646) secondary and university students as well as plenty of disorders. She also applied the sixteen personality factor questionnaire of catel on (4700) secondary and university students. SPSS tools were used to process data.  

View Publication Preview PDF
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fibrewise Multi-Perfect Topological Spaces
...Show More Authors

The essential objective of this paper is to introduce new notions of fibrewise topological spaces on D that are named to be upper perfect topological spaces, lower perfect topological spaces, multi-perfect topological spaces, fibrewise upper perfect topological spaces, and fibrewise lower perfect topological spaces. fibrewise multi-perfect topological spaces, filter base, contact point, rigid, multi-rigid, multi-rigid, fibrewise upper weakly closed, fibrewise lower weakly closed, fibrewise multi-weakly closed, set, almost upper perfect, almost lower perfect, almost multi-perfect, fibrewise almost upper perfect, fibrewise almost lower perfect, fibrewise almost multi-perfect, upper* continuous fibrewise upper topol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 17 2017
Journal Name
Spe/iatmi Asia Pacific Oil & Gas Conference And Exhibition
Retention of Silica Nanoparticles in Limestone Porous Media
...Show More Authors

Nanofluids (dispersion of nanoparticles in a base fluid) have been suggested as promising agents in subsurface industries including enhanced oil recovery. Nanoparticles can easily pass through small pore throats in reservoirs formations; however, physicochemical interactions between nanoparticles and between nanoparticles and rocks can cause a significant retention of nanoparticles. This study investigated the transport, attach, and retention of silica nanoparticles in core plugs. The hydrophilic silica nanoparticles were injected into limestone core as nanofluid of different nanoparticles size (5 nm, and 20 nm), concentration (0.005 – 0.1 wt% SiO2), and base fluid salinity (0 – 3 wt% NaCl) at different temperatures (23, and 50 °C). D

... Show More
Scopus (37)
Crossref (17)
Scopus Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Engineering
A Impact of High Voltage Direct Current Link on Transmission Line in Kurdistan Power System
...Show More Authors

Kurdistan power system is expanded along years ago. The electrical power is transmitted through long transmission lines. The main problem of transmission lines is active and reactive power losses. It is important to solve this issue, unless, the most of electrical energy will lost over transmission system. In this study, High Voltage Direct Current links/bipolar connection were connected in a power system to reduce the power losses. The 132kV, 50 Hz, 36 buses Kurdistan power system is used as a study case. The load flow analysis was implemented by using ETAP.16 program in which Newton-Raphson method for three cases. The results show that the losses are reduced after inserted HVDC links.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of Engineering
The Design and Simulation of a Novel Optical Adder Depending on Optical Tri-state Gates
...Show More Authors

Essential approaches involving photons are among the most common uses of parallel optical computation due to their recent invention, ease of production, and low cost. As a result, most researchers have concentrated their efforts on it. The Basic Arithmetic Unit BAU is built using a three-step approach that uses optical gates with three states to configure the circuitry for addition, subtraction, and multiplication. This is a new optical computing method based on the usage of a radix of (2): a binary number with a signed-digit (BSD) system that includes the numbers -1, 0, and 1. Light with horizontal polarization (LHP) (↔), light with no intensity (LNI) (⥀), and light with vertical polarization (LVP) (↨) is represen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Disclosure and Transparency Criteria In Saudi Banks on The Financial Ratios Indicators
...Show More Authors

The study aimed to measure the effect of applying the disclosure and transparency standards criteria adopted by the Saudi Arabian Monetary Authority on improving performance indicators in the Saudi banking sector, by measuring the extent of the impact of the bank's financial indicators represented by liquidity, profitability and return on assets in Saudi banks by applying the criteria of disclosure and transparency, which is one of the Main principles in the list of governance, which was approved by the Saudi Arabian Monetary Authority. The analytical approach was followed to achieve the goal of the study, as the financial statements of Saudi banks were analyzed during a period of 8-year to test four hypotheses related to measuri

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fuzzy Semimaximal Submodules
...Show More Authors

     Let R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if

 the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are  introduced and given some  properties .

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Nov 01 2010
Journal Name
Al-nahrain Journal Of Science
Chemical Elements Diffusion in the Solar Interior
...Show More Authors

Publication Date
Fri Mar 01 2019
Journal Name
Applied Acoustics
Theoretical model of absorption coefficient of an inhomogeneous MPP absorber with multi-cavity depths
...Show More Authors

View Publication
Scopus (72)
Crossref (62)
Scopus Clarivate Crossref