Preferred Language
Articles
/
jih-2677
Novel Heuristic Approach for Solving Multi-objective Scheduling Problems
...Show More Authors

    In this paper, we studied the scheduling of  jobs on a single machine.  Each of n jobs is to be processed without interruption and becomes available for processing at time zero. The objective is to find a processing order of the jobs, minimizing the sum of maximum earliness and maximum tardiness. This problem is to minimize the earliness and tardiness values, so this model is equivalent to the just-in-time production system. Our lower bound depended on the decomposition of the problem into two subprograms. We presented a novel heuristic approach to find a near-optimal solution for the problem. This approach depends on finding efficient solutions for two problems. The first problem is minimizing total completion time and maximum tardiness. The second is minimizing total completion time and maximum earliness. We used these efficient solutions to find a near-optimal solution for another problem which is a sum of maximum earliness and maximum tardiness. This means we eliminate the total completion time from the two problems. The algorithm was tested on a set of problems of different n. Computational results demonstrate the efficiency of the proposed method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
Functionalization of single and multi-walled carbon nanotubes by chemical treatment
...Show More Authors

In this work we experimentally investigated SWCNTs and MWCNTs to increase their thermal conductivity and electrically functionalization process using different reagents ((nitric acid, HNO3 followed by acid treatment with H2SO4), then washed with deionized water (DW) and then treated with H2O2 via ultrasonic technique. Then repeated the steps with MWCNTs and compare their results in an effort to improve experimental conditions that efficiently differentiate the surface of the single walled carbon nanotubes (SWCNTs) and multi walled carbon nanotubesi(MWCNTs) that less nanotubes destroy and to enhance the properties of them and also to reduce aggregation in liquid. the results were prove by XRD, and infrared spectroscopy (FTIR). The FTIR sp

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Aip Conference Proceedings
Quantization approach to steganography perceptual color spaces
...Show More Authors

In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Jan 11 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Wed Dec 15 2021
Journal Name
Arab World English Journal
Aggressive Language in Literature: A Pragmatic Approach
...Show More Authors

Aggression is a negative form of an anti-social behavior. It is produced because of a particular reason, desire, want, need, or due to the psychological state of the aggressor. It injures others physically or psychologically. Aggressive behaviors in human interactions cause discomfort and disharmony among interlocutors. The paper aims to identify how aggressive language manifests itself in the data under scrutiny in terms of the pragmatic paradigm. Two British literary works are the data; namely, Look Back in Anger by John Osborne (1956), and The Birthday Party by Harold Pinter (1957). This paper endeavors to answer the question of how aggressive language is represented in literature pragmatically? It is hoped to be significant to

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
A Metaheuristic Approach to the C1S Problem
...Show More Authors

Given a binary matrix, finding the maximum set of columns such that the resulting submatrix has the Consecutive Ones Property (C1P) is called the Consecutive Ones Submatrix (C1S) problem. There are solution approaches for it, but there is also a room for improvement. Moreover, most of the studies of the problem use exact solution methods. We propose an evolutionary approach to solve the problem. We also suggest a related problem to C1S, which is the Consecutive Blocks Minimization (CBM). The algorithm is then performed on real-world and randomly generated matrices of the set covering type.  

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
Narrative and Electronic news Story: (Semiotic approach)
...Show More Authors

The e-news is one of the most important journalistic arts in new media (the Internet). The process of telling the story by the journalist is an important aspect of the communicative process between the users of the internet and the reporter. The electronic news is characterized by having text, fixed images, animations, videos and sound. All these give greater vitality to the communicative process and increase the semiotic dimensions. Also, it makes the narrative process more distinctive and embodied of the elements of the event. This research studies all these aspects and tries to show the distinction between the semiotics of narration and the electronic news.

View Publication
Publication Date
Sat Dec 31 2016
Journal Name
Al-kindy College Medical Journal
Selective Approach in Managing Penetrating Neck Injury
...Show More Authors

Background: Penetrating Neck Injuries (PNI) management represents a challenge to most surgeons in civilian trauma, in weighing selective versus mandatory exploration of all cases in different circumstances. Data are encouraging surgeons to adopt the former approach.Objectives: The study aims to assess the selective approach in our war and terror time events in Al-Yarmouk teaching hospital.Type of the study:A retrospective study. Methods: Data of patients presented to the Thoracic and Vascular ward in Al-Yarmouk teaching hospital with PNI were assessed retrospectively, from March 2013 to March 2015, and analyzed for epidemiology, mechanism of trauma, management methods, associated organ injuries, complications and mortality. Results: Amon

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

Intrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S

... Show More
View Publication Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
mRNA Approach Image Encryption Using LUC Algorithm
...Show More Authors

      Bioinformatics is one of the computer science and biology sub-subjects concerned with the processes applied to biological data, such as gathering, processing, storing, and analyzing it. Biological data (ribonucleic acid (RNA), deoxyribonucleic acid (DNA), and protein sequences) has many applications and uses in many fields (data security, data segmentation, feature extraction, etc.). DNA sequences are used in the cryptography field, using the properties of biomolecules as the carriers of the data. Messenger RNA (mRNA) is a single strand used to make proteins containing genetic information. The information recorded from DNA also carries messages from DNA to ribosomes in the cytosol. In this paper, a new encryption technique bas

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Solution of Fuzzy Maximal Flow Problems of Vehicles in Province of Diwaniyah Using the Ranking Function for Fuzzy Linear Programming Model
...Show More Authors

Abstract

The traffic jams taking place in the cities of the Republic of Iraq in general and the province of Diwaniyah especially, causes return to the large numbers of the modern vehicles that have been imported in the last ten years and the lack of omission for old vehicles in the province, resulting in the accumulation of a large number of vehicles that exceed the capacity of the city's streets, all these reasons combined led to traffic congestion clear at the time of the beginning of work in the morning, So researchers chose local area network of the main roads of the province of Diwaniyah, which is considered the most important in terms of traffic congestion, it was identified  fuzzy numbers for

... Show More
View Publication Preview PDF
Crossref