Scheduling problems have been treated as single criterion problems until recently. Many of these problems are computationally hard to solve three as single criterion problems. However, there is a need to consider multiple criteria in a real life scheduling problem in general. In this paper, we study the problem of scheduling jobs on a single machine to minimize total tardiness subject to maximum earliness or tardiness for each job. And we give algorithm (ETST) to solve the first problem (p1) and algorithm (TEST) to solve the second problem (p2) to find an efficient solution.
The purpose of this research is to determine the extent to which independent auditors can audit the requirements of e-commerce related to (infrastructure requirements, legislation and regulations, tax laws, and finally human cadres). To achieve this, a questionnaire was designed for auditors. Numerous statistical methods, namely arithmetic mean and standard deviation, have been used through the implementation of the Statistical Packages for Social Sciences (SPSS) program.
The research has reached several results, the most important of which are: There are noobstacles to enabling the auditor to audit the application of the e-commerce requirements as well as the respective(infrastructure requirements, legislation and regulations, t
... Show MoreThe formation of the identity of the ego associates with adolescence and the beginnings of youth, where represents the basic requirement for growth. This stage reflects a turning point towards the necessary autonomy for the growth of normal in adulthood that needs the ego growth from his point of view to pass eight consecutive stages of the individual faces in each particular crisis. It is determined by its growth path depending on the nature of solved positively or negatively, influenced by several factors: biological, social, cultural, personal, and a dogmatic obstacle to personal thinking which refers to the kind of sclerotic thought a bigot to the inside of obsolete beliefs refuse to discuss and consider. The final idea is debatable
... Show MoreThe anatomical features of leaves and stems of seven species belonging to five genera of the Papaveraceae family were studied, including: Fumaria bracteosa Pomel, 1875; Glaucium grandiflorum Boissier & A. Huet,1856; Hypecoum pendulum Linnaeus, 1753; Papaver fugax Poiret,1804; Papaver macrostomum Boissier & A. Huet, 1867; Papaver rhoeas Linnaeus, 1753 and Roemeria refracta de Candolle,1821. The results showed that the anticlinal cell walls of the adaxial surface were more thickened in P. fugax, H. pendulum, P. macrostomum and R.refracta, while it was thin in P. rhoeas. The cur
... Show MoreThe public budget is on the same time an art and a science .As an accountable science it seeks balance between public income and public expenditure for an accountable year. And as an accountable art it seeks to achieve economic balance by distributing equitable income in order to reach sustainable development .This is the optimal use of all natural and human resources to address scarcity of natural resources facing the increase need of human resources by spending on education, health, environment, housing, agriculture and industry to achieve social justice for the current generation and future generations. Since the first budget in Iraq on 1921 an accounting budget, is balancing the sections and items has been adopted and since the publi
... Show MoreThe main task of creating new digital images of different skin diseases is to increase the resolution of the specific textures and colors of each skin disease. In this paper, the performance of generative adversarial networks has been optimized to generate multicolor and histological color digital images of a variety of skin diseases (melanoma, birthmarks, and basal cell carcinomas). Two architectures for generative adversarial networks were built using two models: the first is a model for generating new images of dermatology through training processes, and the second is a discrimination model whose main task is to identify the generated digital images as either real or fake. The gray wolf swarm algorithm and the whale swarm alg
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More