The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.
الوصف In this time, most researchers toward about preparation of compounds according to green chemistry. This research describes the preparation of 2-fluoro-5-(substituted benzylideneamino) benzonitrile under reflux and microwave methods. Six azomethine compounds (B1-6) were synthesized by two methods under reflux and assisted microwave with the comparison between the two methods. Reflux method was prepared of azomethine (B1-6) by reaction of 5-amino-2-fluorobenzonitrile with some aldehyde derivatives with (50–100) mL of absolute ethanol and some quantity of GAA and time is limited between (2–5) hours with a yield between (60–70) percent with recrystallization for appropriate solvents. But the microwave-assisted method was synthe
... Show MoreIn this time, most researchers toward about preparation of compounds according to green chemistry. This research describes the preparation of 2-fluoro-5-(substituted benzylideneamino) benzonitrile under reflux and microwave methods. Six azomethine compounds (B1-6) were synthesized by two methods under reflux and assisted microwave with the comparison between the two methods. Reflux method was prepared of azomethine (B1-6) by reaction of 5-amino-2-fluorobenzonitrile with some aldehyde derivatives with (50–100) mL of absolute ethanol and some quantity of GAA and time is limited between (2–5) hours with a yield between (60–70) percent with recrystallization for appropriate solvents. But the microwave-assisted method was synthesized of co
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreIn this work, the fractional damped Burger's equation (FDBE) formula = 0,
Shumblan (SH) is one of the most undesirable aquatic plants widespread in the irrigation channels and water bodies. This work focuses on boosting the biogas potential of shumblan by co-digesting it with other types of wastes without employing any chemical or thermal pretreatments as done in previous studies. A maximum biogas recovery of 378 ml/g VS was reached using shumblan with cow manure as inoculum in a ratio of 1:1. The methane content of the biogas was 55%. Based on volatile solid (VS) and C/N ratios, biogas productions of 518, 434, and 580 ml/g VS were obtained when the shumblan was co-digested with food wastes (SH:F), paper wastes (SH:P), and green wastes (SH:G) respectively. No significant changes of methane contents were observ
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThis research investigates the subject of the impact of wars (as a manifestation of crisis) on architecture, and the extent of continuing wars physical and moral results of wars, even after the end of the cause of the crisis. The impact of different rebuilding which exposed to the effects of the war seems different in crisis regions.
The problem of research is about the uncertainty of the impact of the way chooses for reconstructing the buildings after wars in the continuity of the crisis of war. The goals of this research are to clarify the influence of methods of reconstruction of buildings in a city chosen which is Beirut, on the continuation of the war crisis with the argument of demolishing and rebuilding newly or keeping tr
... Show MoreBackground: Smoking is considering a major risk factor for development and progression of periodontal disease. Investigations regarding the association between smoking and periodontal disease have consistently demonstrated negative periodontal effects and greater probabilities of established periodontal disease among smokers in comparison with non smokers. The purpose of this study was to evaluate the effects of smoking on periodontal health status and on the salivary levels of alkaline phosphatase (ALP), lactate dehydrogenase (LDH) and creatine kinase (CK), and to correlate the clinical parameters of periodontal health with the biochemical findings in smokers and non-smokers. Materials and methods: Unstimulated saliva sample was collected
... Show MoreIn this research, the focus was on estimating the parameters on (min- Gumbel distribution), using the maximum likelihood method and the Bayes method. The genetic algorithmmethod was employed in estimating the parameters of the maximum likelihood method as well as the Bayes method. The comparison was made using the mean error squares (MSE), where the best estimator is the one who has the least mean squared error. It was noted that the best estimator was (BLG_GE).