The traveling salesman problem (TSP) is a well-known and important combinatorial optimization problem. The goal is to ï¬nd the shortest tour that visits each city in a given list exactly once and then returns to the starting city. In this paper we exploit the TSP to evaluate the minimum total cost (distance or time) for Iraqi cities. So two main methods are investigated to solve this problem; these methods are; Dynamic Programming (DP) and Branch and Bound Technique (BABT). For the BABT, more than one lower and upper bounds are be derived to gain the best one. The results of BABT are completely identical to DP, with less time for number of cities (n), 5 ≤ n ≤ 25. These results proof the efficiency of BABT compared with so
... Show MoreThe DC electrical conductivity properties of Ge60Se40-xTex alloy with x = 0, 5, 10, 15 and 20). The samples were formed in the form of discs with the thickness of 0.25–0.30 cm and the diameter of 1.5 cm. Samples were pressed under a pressure of 6 tons per cm2 , using a ton hydraulic press. They were prepared after being pressed using a ton hydraulic press using a hydraulic press. Melting point technology use to preper the samples. Continuous electrical conductivity properties were recorded from room temperature to 475 K. Experimental data indicates that glass containing 15% Te has the highest electrical conductivity allowing maximum current through the sample compared to Lu with other samples. Therefore, it is found that the DC co
... Show More• Causes of Laser Hazard
I - Inherent Hazards to Laser Beam Direct or reflected laser beams have consequential health effects range from minor skin burn to irreversible eye injuries. The hazards depend on the
power output and wavelength of the used laser and depend on the exposure time and MPE. ti & 2)
Election study included four sites for the waters in area of Youssifiyah south of Baghdad (river water, tank water, liquefactions water, and water filtrate and seethed and purifier by alum and chloride), the samples were collected during the month of June in 2007. Temperature, electrical conductivity and acidity are measured. Also , the concentration of chloride , sulphate , carbonate , nitrate , sodium , calcium , magnesium , hard total and total dissolved substances are determined , as well as heavy metals assess environmental risk (such as Cu, Pb, Zn, Fe). It was also a study of bacterial totals included both total Bacteria (TB) and Total Coliform Bacteria (TC) and Fecal Coliform (FC) and Fecal Streptococci (FS). The stu
... Show MoreThe study includes building a 3-D geological model, which involves get the Petrophysical properties as (porosity, permeability and water saturation). Effective Porosity, water saturation results from log interpretation process and permeability from special correlation using core data and log data. Clay volume can be calculated by six ways using IP software v3.5 the best way was by using gamma Ray. Also, Water Resistivity, flushed zone saturation and bulk volume analysis determined through geological study. Lithology determined in several ways using M-N matrix Identification, Density-Neutron and Sonic-Neutron cross plots. The cut off values are determined by Using EHC (Equivalent Hydra
The purpose of this article is to introduce reverse engineering procedure (REP). It can achieved by developing an industrial mechanical product that had no design schemes throughout the 3D-Scanners. The aim of getting a geometric CAD model from 3D scanner is to present physical model. Generally, this used in specific applications, like commercial plan and manufacturing tasks. Having a digital data as stereolithography (STL) format. Converting the point cloud be can developed as a work in programming by producing triangles between focuses, a procedure known as triangulation. Then it could be easy to manufacture parts unknown documentation and transferred the information to CNC-machines. In this work, modification was proposed and used in RE
... Show MoreThe principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E
... Show MoreThis paper describes a modified mathematical method that used for controlling and generating three dimensional surfaces based on different axes (X, Y, and Z) and free axis. The main aim of the proposed method is to allow the designer to change the shape of the surface to the desired one without changing the original data points which is presented in the earlier version of this paper under title "3D Surface Reconstruction of Mathematical Modelling Used for Controlling the Generation of Different Bi-cubic B-Spline in Matrix Form without Changing the Control Points". The proposed method has been done by changing the t and s, parameters value that are assigned secretly by the designer. Therefore, in case off the control points have been disc
... Show MoreIn this paper, a discussion of the principles of stereoscopy is presented, and the phases
of 3D image production of which is based on the Waterfall model. Also, the results are based
on one of the 3D technology which is Anaglyph and it's known to be of two colors (red and
cyan).
A 3D anaglyph image and visualization technologies will appear as a threedimensional
by using a classes (red/cyan) as considered part of other technologies used and
implemented for production of 3D videos (movies). And by using model to produce a
software to process anaglyph video, comes very important; for that, our proposed work is
implemented an anaglyph in Waterfall model to produced a 3D image which extracted from a
video.