0
The emphasis of Master Production Scheduling (MPS) or tactic planning is on time and spatial disintegration of the cumulative planning targets and forecasts, along with the provision and forecast of the required resources. This procedure eventually becomes considerably difficult and slow as the number of resources, products and periods considered increases. A number of studies have been carried out to understand these impediments and formulate algorithms to optimise the production planning problem, or more specifically the master production scheduling (MPS) problem. These algorithms include an Evolutionary Algorithm called Genetic Algorithm, a Swarm Intelligence methodology called Gravitational Search Algorithm (GSA), Bat Algorithm (BAT), T
... Show MoreThe aim of present study is to determine the optimum parameters of friction stir welding process and known the most important parameter along with percentage contribution of each parameter which effect on tensile strength and joint efficiency of FS welded joint of dissimilar aluminum alloys AA2024-T3 and AA7075-T73 of 3 mm thick plates by applied specific number of experiments using Taguchi method .AA2024 was placed on the advancing side and AA7075 on the retreating side. FSW was achieved under three different rotation speeds (898, 1200 and 1710) rpm, three different welding speeds (20, 45 and 69) mm\min , three different pin profiles (cylindrical, threaded cylindrical and cone) and tool tilt angle 2◦. Taguchi method w
... Show MoreThe article aims to study the crisis of political change from three Phases . The first focuses on the crises of political legitimacy and democratic postponement, as fundamental issues in analyzing the phenomenon of power struggle through the dialectic between the concept of historical legitimacy and institutional fragility from the beginning of statehood in 1962 to the stage of multi-partyism and the cessation of the electoral process in the 1990s. While the second focuses on the question of the monopoly of power in the post-terrorism and national reconciliation according to considerations Political, social and security measures to prolong the life of the regime and avoid the demands of political change brought about
... Show MoreAbstract Political power in Lebanon is a fundamental objective of any political organization, whether political party or political group. Thus, there is a conflict of power. There are two kinds of political conflict that are differentiated by the idea of legitimacy. The competition is in the political system when the agreement between the social forces is considered legitimate, and the conflict is on the political system when the agreement between these forces ceases to be legitimate and Are working to topple it and seek to establish an alternative system. Therefore, the succession of power in Lebanon is a result of the competition and political conflict, which is in turn a result of the large number of regional and international players
... Show MoreModern emerged technologies impose development and fabrication of miniatur-ized parts and devices in the micro- and nano-scale. Producing micro- and nano-featured structures requires nonconventional machining processes where con-ventional machining processes such as grinding, milling and eroding have failed. New emerging processes, such laser machining processes, are still fraught with almost invincible processes. Micro-/nano-machining are the pro-cesses of producing parts, microsystems or features at a scale of a few microm-eters and less than one hundred nanometers, respectively. Precise cutting and clean material removal accompanied with a negligible heat affected zone (HAZ), which are usually the characteristics of laser ablation, have
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
In this research, (MOORA) approach based– Taguchi design was used to convert the multi-performance problem into a single-performance problem for nine experiments which built (Taguchi (L9) orthogonal array) for carburization operation. The main variables that had a great effect on carburizing operation are carburization temperature (oC), carburization time (hrs.) and tempering temperature (oC). This study was also focused on calculating the amount of carbon penetration, the value of hardness and optimal values obtained during the optimization by Taguchi approach and MOORA method for multiple parameters. In this study, the carburization process was done in temperature between (850 to 950 ᵒC) for 2 to 6
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.