There are several methods that are used to solve the traditional transportation problems whose units of supply, demand quantities, and cost transportation are known exactly. These methods obtain basic solution, and develop it to the best solution through a series of consecutive calculations to obtain the optimal solution.
The steps are more complex with fuzzy variables, so this paper presents the disadvantages of solutions of the traditional ways with existence of variables in the fuzzy form.
This paper also presents a comparison between the results that emerged after using different conversion ranking formulas to convert from fuzzy form to crisp form on the same numerical example with a full fuzzy form. The problem has been then converted into a linear programming model, and the BIG-M method to be later used to find the optimal solution that represents the number of units transferred from processing or supply centers to a number of demand centers based on the known cost of transportation.
Achieving the goal of the problem is by finding the lowest total transportation cost,
while the comparison is based on that value. The results are presented in a
comprehensive table that organizes data and results in a way that facilitates quick
and accurate comparison. An amendment to one of the order formats was suggested,
because it has different results compared to other formulas. One of the ranking
equations is modified, because it has different results compared to other methods..
In this study tungsten oxide and graphene oxide (GO-WO2.89) were successfully combined using the ultra-sonication method and embedded with polyphenylsulfone (PPSU) to prepare novel low-fouling membranes for ultrafiltration applications. The properties of the modified membranes and performance were investigated using Fourier-transform infrared spectroscopy (FT-IR), scanning electron microscopy (SEM), contact angle (CA), water permeation flux, and bovine serum albumin (BSA) rejection. It was found that the modified PPSU membrane fabricated from 0.1 wt.% of GO-WO2.89 possessed the best characteristics, with a 40.82° contact angle and 92.94% porosity. The permeation flux of the best membrane was the highest. The pure water permeation f
... Show MoreThe removal of commercial orange G dye from its aqueous solution by adsorption on tobacco leaves (TL) was studied in respect to different factor that affected the adsorption process. These factors including the tobacco leaves does, period of orange G adsorption, pH, and initial orange G dye concentration .Different types of isotherm models were used to describe the orange G dye adsorption onto the tobacco leaves. The experimental results were compared using Langmuir, and frundlich adsorption isotherm, the constants for these two isotherm models was determined. The results fitted frundlich model with value of correlation coefficient equal to (0.981). The capacity of adsorption for the orange G dye was carried out using various kinetic models
... Show MoreThe construction industry plays a crucial role in the countries' economy, especially in the developed country. This point encourages the concerned institution to use new techniques and integrate many techniques and methods to maximize the benefits. The main objective of this research is to evaluate the use of risk management, value management, and building information modeling in the Iraqi construction industry. The evaluation process aims at two objectives. The direct objective was to evaluate the knowledge in risk management (RM), value management (VM), and building information modeling (BIM). The indirect objective was to support the participants with information related to the main items mentioned. The questionnaire
... Show MoreDue to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi
... Show MoreCeruloplasmin (Cp) is one of the acute phase protein, in this review ,we studied the level of ceruloplasmin with copper (Cu) and iron in 90 patients with coronary heart diseas ( those patients are divided into three groups, whom are stable angina , unstable angina and myocardial infarction compared with 30 healthy volunteers) and the roles of them as diagnostic and prognostic tools.The diagnosis was attend by a clinical examination carried out by the consult medical staff in Ibn AL-Nafis hospital. The result: ceruloplasmin recorded a significantly(p<0.05)higher level in all patient groups compared with the control, so this result supports the hypothesis that a high serum ceruloplasmin level is a risk factor for coronary heart di
... Show MoreThe smart city concept has attracted high research attention in recent years within diverse application domains, such as crime suspect identification, border security, transportation, aerospace, and so on. Specific focus has been on increased automation using data driven approaches, while leveraging remote sensing and real-time streaming of heterogenous data from various resources, including unmanned aerial vehicles, surveillance cameras, and low-earth-orbit satellites. One of the core challenges in exploitation of such high temporal data streams, specifically videos, is the trade-off between the quality of video streaming and limited transmission bandwidth. An optimal compromise is needed between video quality and subsequently, rec
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show More