Throughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.
The aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.
It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed
... Show MoreThe integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreLying is considered a dangerous tendency among children if it has become a habit. It results in many social problems, such as child’s loss of confidence, lack of others’ respect to him, and his lack of respect to the desired values of the society, such as honesty and trust. Consequently, he will be led to a deviation when he becomes old; especially if the child’s socially unaccepted behavior has not been directed. The research, thus, aims to examine the causes of lying in the most important stage of children’s life; that is, between (4-6) years. Such an aim helps to know about the individual reasons of lying among males and females from teachers’ perspectives. To meet the objective of the study, a number of (128) children
... Show MoreConservative pipes conveying fluid such as pinned-pinned (p-p), clamped–pinned (c-p) pipes and clamped-clamped (c-c) lose their stability by buckling at certain critical fluid velocities. In order to experimentally evaluate these velocities, high flow-rate pumps that demand complicated fluid circuits must be used.
This paper studies a new experimental approach based on estimating the critical velocities from the measurement of several fundamental natural frequencies .In this approach low flow-rate pumps and simple fluid circuit can be used.
Experiments were carried out on two pipe models at three different boundary conditions. The results showed that the present approach is more accurate for est
... Show MoreIn this research, a detailed finite-element (FE) analysis of the combined influence of the drilled-hole position, the shape of the hole, and the fillet design on the structural and dynamic performance of spur gears is investigated. ANSYS R16.2 was used to create a three-dimensional numerical model that can be used to assess the bending stress distribution and vibration response under realistic loading conditions. A trochoidal fillet and four circular fillet radii (0.5, 1.0, 1.5 and 2.0 mm) were studied to determine their effect on the stress concentration behavior. FE-guided hole-suggestion process was introduced which is an automated process in which low-stress zones to be cut away are identified so as to allo
... Show MoreThis study aims to expand the traditional model in calculating the break-even point to include the cost of capital invested and the funds employed in industrial companies through a change in the traditional model and the effect of adopting the advanced model of the break point on the operational leverage in planning profits in industrial companies. Where, the analysis of the break-even point and the operational leverage of the tools important by the management, which is used in the field of planning profits. A parity analysis in its sophisticated model will help in planning profits and determine the optimal size of production that maximizes profits. For its part, the operational leverage helps to make decisions regarding the expansion of
... Show More