The presented study investigated the scheduling regarding jobs on a single machine. Each job will be processed with no interruptions and becomes available for the processing at time 0. The aim is finding a processing order with regard to jobs, minimizing total completion time , total late work , and maximal tardiness which is an NP-hard problem. In the theoretical part of the present work, the mathematical formula for the examined problem will be presented, and a sub-problem of the original problem of minimizing the multi-objective functions is introduced. Also, then the importance regarding the dominance rule (DR) that could be applied to the problem to improve good solutions will be shown. While in the practical part, two exact methods are important; a Branch and Bound algorithm (BAB) and a complete enumeration (CEM) method are applied to solve the three proposed MSP criteria by finding a set of efficient solutions. The experimental results showed that CEM can solve problems for up to jobs. Two approaches of the BAB method were applied: the first approach was BAB without dominance rule (DR), and the BAB method used dominance rules to reduce the number of sequences that need to be considered. Also, this method can solve problems for up to , and the second approach BAB with dominance rule (DR), can solve problems for up to jobs in a reasonable time to find efficient solutions to this problem. In addition, to find good approximate solutions, two heuristic methods for solving the problem are proposed, the first heuristic method can solve up to jobs, while the second heuristic method can solve up to jobs. Practical experiments prove the good performance regarding the two suggested approaches for the original problem. While for a sub-problem the experimental results showed that CEM can solve problems for up to jobs, the BAB without dominance rule (DR) can solve problems for up to , and the second approach BAB with dominance rule (DR), can solve problems for up to jobs in a reasonable time to find efficient solutions to this problem. Finally, the heuristic method can solve up to jobs. Arithmetic results are calculated by coding (programming) algorithms using (MATLAB 2019a)
An experiment was carried out to study the effect of soil organic carbon (SOC) and soil texture on the distance of the wetting front, cumulative water infiltration (I), infiltration rate (IR), saturated water conductivity (Ks), and water holding capacity (WHC). Three levels ( 0, 10, 20, and 30 g OC kg-1 ) from organic carbon (OC) were mixed with different soil materials sandy, loam, and clay texture soils. Field capacity (FC) and permanent wilting point (PWP) were estimated. Soil materials were placed in transparent plastic columns(12 cm soil column ), and water infiltration(I) was measured as a function of time, the distance of the wetting front and Ks. Results showed that advance we
This study is pointed out to estimate the effectiveness of two solvents in the extraction and evaluating the active ingredients and their antioxidant activity as well as anti-cancer efficiency. Therefore, residues from four different Brassica vegetables viz. broccoli, Brussels sprout, cauliflower, and red cherry radish were extracted using two procedures methods: methanolic and water crude extracts. Methanol extracts showed the highest content of total phenolic (TP), total flavonoids (TF), and total tannins (TT) for broccoli and Brussels sprouts residues. Methanolic extract of broccoli and Brussels sprouts residues showed the highest DPPH· scavenging activity (IC50 = 15.39 and 18.64 µg/ml). The methanol and water ex
... Show MoreIn this paper, thermal performance of a zig-zig solar air heater (ZZSAH) with and without using steel wire mesh on the absorber plate of the collector is experimentally investigated. The experimental work includes four inclination angles of the collector 20o, 30o, 45o, and 60o and four air mass flow rates of 0.03, 0.04, 0.06, and 0.08 kg/s under varieties of operating conditions of a geographic location of Baghdad. New correlation equations of Nusselt number are obtained from experimental results for both types of collectors where the effect of varying of the inclination angle of collector taken into consideration in the experiment. The correlations show good agreement wi
... Show MoreBackground: Dental casts come into direct contact with impression materials and other items that are contaminated by saliva and blood from a patient's mouth, leaving the casts susceptible to cross-contamination. The disinfectant solutions of the impression materials cause various adverse reactions. Therefore, disinfection of dental casts may be effective in preventing cross infection. This study was carried out to evaluate the surface hardness, dimensional accuracy, reproduction of details and surface porosity of type III, type IV and type IV extra hard dental stone after immersion in and spray by using SOLO and Sodium hypochlorite disinfectant solutions. Materials and methods: 240 Stone samples were prepared in rubber rings, A total of 60
... Show MoreThe concept of social graphic design is one of the most critical areas that highlight the designer's knowledge of social responsibility by employing design skills in community awareness. This study focused on defining social graphic design, the meaning, practices, and strategies for designing awareness posters. This study reviewed two examples of awareness posters that reflect the Saudi designer's practices. The results summarized that social graphic design is a concept not taught directly but gained from permanent practice in designing awareness posters that interact with community issues. The designer's understanding of his social events and their sensing in the visual form of a poster reflects the designer's social awareness. Social g
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThis study aims to find out the effect of the mediator on scaffolding fourth yearstudent- teachers' teaching competencies and their self-efficacy. The present study combines scaffolding and self-efficacy by using a mediator on scaffolding students affects teaching competencies and selfefficacy and from the results of which the existence of student-teachers’ selfawareness was ensured as an effect of the same independent variable. The model affects their teaching competencies and led them to be aware of the needs of their pupils and themselves.