The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.
The concern seemed clear due to the phenomenon of illegal immigration and flows that accompany it and reach the borders of countries in an unprecedented way, paid Countries to take the principle of cooperation as an optimal solution to overcome the challenges that accompanied illegal immigration. The challenges were to set rules to combat this phenomenon and put means to put an end to it , because it is clearly linked to crime through organized crime networks that facilitate the process of smuggling migrants through international waters. And to create roads that facilitate infiltration across the borders of the destination countries, taking advantage of the gaps existed in the conten
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreThere are many mechanisms that can be used to safeguard intangible cultural heritage during armed conflict, either indirectly through the international texts of armed conflict, from the perspective of protecting customs, traditions and religious beliefs, or directly by incorporating this heritage into UNESCO regulations. This heritage can also be preserved from the concept of human rights principles that can be applied during armed conflicts. Moreover, the best way to preserve this heritage is to prosecute and punish violators of the provisions of safeguarding this heritage, whether in national criminal courts or international criminal courts.
A partial temporary immunity SIR epidemic model involv nonlinear treatment rate is proposed and studied. The basic reproduction number is determined. The local and global stability of all equilibria of the model are analyzed. The conditions for occurrence of local bifurcation in the proposed epidemic model are established. Finally, numerical simulation is used to confirm our obtained analytical results and specify the control set of parameters that affect the dynamics of the model.
Everybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, sc
... Show MoreThe dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s
... Show MoreThyroid disease is a common disease affecting millions worldwide. Early diagnosis and treatment of thyroid disease can help prevent more serious complications and improve long-term health outcomes. However, thyroid disease diagnosis can be challenging due to its variable symptoms and limited diagnostic tests. By processing enormous amounts of data and seeing trends that may not be immediately evident to human doctors, Machine Learning (ML) algorithms may be capable of increasing the accuracy with which thyroid disease is diagnosed. This study seeks to discover the most recent ML-based and data-driven developments and strategies for diagnosing thyroid disease while considering the challenges associated with imbalanced data in thyroid dise
... Show Moreيعد الدين من أكثر المتغيرات تأثيرا في سلوك البشر بصورة عامة ، وفي شخصياتهم وصحتهم النفسية بصورة خاصة .
ولأحداث الحياة والأزمات والشدائد تأثيرها الكبير في هذا المتغير وفي مدى تمسك الناس بقيمهم الدينية .
وفي العراق ، لا تخفى علينا المآسي والأزمات والشدائد التي مر ويمر بها البلد مما قد يزعزع ثقة الناس بمعتقداتهم وقيمهم ، ومن جانب آخر فان دخول المحت
... Show MoreAbstract
Social media has thrived recently and public organizations at Thi-Qar governorate across different levels are experimenting with launching government social media (GSM) to facilitating two-way interactions between the government and its citizens. Both scholars and practitioners are focusing on understanding the key success factors related to the create of GSM. This study aimed to identify the key success factors by exploring the formation mechanism of individuals’ continuous usage intention. Through the theoretical perspective of the uses and gratifications theory. We identify the gratification factors that stimulate users’ continuance intention toward GSM. Furthermore, we draw upon the stimulus–organism–
... Show More