The presented study investigated the scheduling regarding jobs on a single machine. Each job will be processed with no interruptions and becomes available for the processing at time 0. The aim is finding a processing order with regard to jobs, minimizing total completion time , total late work , and maximal tardiness which is an NP-hard problem. In the theoretical part of the present work, the mathematical formula for the examined problem will be presented, and a sub-problem of the original problem of minimizing the multi-objective functions is introduced. Also, then the importance regarding the dominance rule (DR) that could be applied to the problem to improve good solutions will be shown. While in the practical part, two exact methods are important; a Branch and Bound algorithm (BAB) and a complete enumeration (CEM) method are applied to solve the three proposed MSP criteria by finding a set of efficient solutions. The experimental results showed that CEM can solve problems for up to jobs. Two approaches of the BAB method were applied: the first approach was BAB without dominance rule (DR), and the BAB method used dominance rules to reduce the number of sequences that need to be considered. Also, this method can solve problems for up to , and the second approach BAB with dominance rule (DR), can solve problems for up to jobs in a reasonable time to find efficient solutions to this problem. In addition, to find good approximate solutions, two heuristic methods for solving the problem are proposed, the first heuristic method can solve up to jobs, while the second heuristic method can solve up to jobs. Practical experiments prove the good performance regarding the two suggested approaches for the original problem. While for a sub-problem the experimental results showed that CEM can solve problems for up to jobs, the BAB without dominance rule (DR) can solve problems for up to , and the second approach BAB with dominance rule (DR), can solve problems for up to jobs in a reasonable time to find efficient solutions to this problem. Finally, the heuristic method can solve up to jobs. Arithmetic results are calculated by coding (programming) algorithms using (MATLAB 2019a)
A Al-Nuaimy, B Fadheel…, IPMJ, 2009 - Cited by 1
AN Adil A, F Basman M, 2009
This study deals with the concepts of Colonialism and Civilization in Aimé Cesaire’s A Tempest. The concern of this study is to discuss how postcolonial writers are continually re-writing the Western canonical works as a reaction to the European cultural hegemony. The Western representations of the black are products of specific moments and developments in history and culture. A Tempest reflects a certain historical moment in the decolonization process.
A Tempest is analysed to reveal the counter literary strategy used by Aimé Cesaire, and to disclose the reasons why re-writing and writing back are considered as vital and inescapable tasks. Shakespeare’s The Tempest, which deals with the
... Show MoreThe laws of the three religions tend to extend the rules and foundations of coexistence, and this is achieved in achieving the values and principles that these laws have nourished in all societies.
Our research deals with a major problem that has broken out in our societies, namely (disturbing the balance of values and behavioral standard between people), and perhaps one of the greatest causes of the problem is to move away from the correct divine discourse and sound approach, as well as corruption of common sense and the violation of its rules and found principles in the hearts of people.
The definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions, Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.
This study is concerned with the evaluation of the effect of Euphrates River water quality in Al-Samawa region during
the period 1984-2003 on efficiency and reliability of reverse osmosis desalination systems by calculating the calcium
sulfate scaling index depending on the following indicators: - TDS, Ca+2, Mg+2, Na+1, Cl-1, So4-2, HCO3-1. It was
found from data analysis that this index for these units is greater than permissible limit. Also, the fitted relationship
between this index and TDS is logarithmic, i.e. this index varies more rapidly than TDS, and consequently it is more
representative to the water quality than TDS.
Abstract
The target derivative are gentamicin linked with L-Val- L-Ala by an ester linkage. These were synthesized by esterification method, which included the reaction of -OH hydroxyl group on (carbon No.5) of gentamicin with the acid chloride of the corresponding dipeptide, The preparation of new derivative of gentamicin involved protected the primary & secondary amine groups of Gentamicin, by Ethylchloroformate (ECF) to give N-carbomethoxy Gentamicin which was used for further chemical synthesis involving the free hydroxyl groups.
Then prepared dipeptide (L-Val- L-Ala) by conventional solution method in present DCC & HoBt then reacted with thionyl
... Show MoreBlogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.