Non-additive measures and corresponding integrals originally have been introduced by Choquet in 1953 (1) and independently defined by Sugeno in 1974 (2) in order to extend the classical measure by replacing the additivity property to non-additive property. An important feature of non –additive measures and fuzzy integrals is that they can represent the importance of individual information sources and interactions among them. There are many applications of non-additive measures and fuzzy integrals such as image processing, multi-criteria decision making, information fusion, classification, and pattern recognition. This paper presents a mathematical model for discussing an application of non-additive measures and corresponding integrals in tourism management. First, the problem of tourism management is described for one of the tourism companies in Iraq. Then, fuzzy integrals (Sugeno integral, Choquet integral, and Shilkret integral) are applied with respect to non-additive measures to evaluate the grade of the gratification of the tourist of staying in a particular town for determining the best evaluation.
This study focuses on improving the safety of embankment dams by considering the effects of vibration due to powerhouse operation on the dam body. The study contains two main parts. In the first part, ANSYS-CFX is used to create the three-dimensional (3D) Finite Volume (FV) model of one vertical Francis turbine unit. The 3D model is run by considering various reservoir conditions and the dimensions of units. The Re-Normalization Group (RNG) k-ε turbulence model is employed, and the physical properties of water and the flow characteristics are defined in the turbine model. In the second phases, a 3D finite element (FE) numerical model for a rock-fill dam is created by using ANSYS®, considering the dam connection with its powerhouse
... Show MoreThis research discussed and analyzed the formulation of a strategy to manage tax compliance risks, as an applied research in the General commission for Taxes. The questionnaire was used as a research tool to identify the factors that stimulate or retard the research sample from being compliant. The K-means clustering method was also used to enable the classification of the research sample's views into four behaviors, some of these views pose tax-compliance risks. The research concluded that risk management is a continuous process and that all departments of the General commission for Taxes are responsible for its implementation to enable them to deal with the behavior of the taxpayer towards tax compliance. And it recommended
... Show MoreEfficacy of Varnishes with: Bioactive Glass, Recaldent Technology and Silver Diamine Fluoride in Comparison with Sodium Fluoride on Tooth Surface Micro-hardness (an In Vitro Study)
Blades of gas turbine are usually suffered from high thermal cyclic load which leads to crack initiated and then crack growth and finally failure. The high thermal cyclic load is usually coming from high temperature, high pressure, start-up, shut-down and load change. An experimental and numerical analysis was carried out on the real blade and model of blade to simulate the real condition in gas turbine. The pressure, temperature distribution, stress intensity factor and the thermal stress in model of blade have been investigated numerically using ANSYS V.17 software. The experimental works were carried out using a particular designed and manufactured rig to simulate the real condition that blade suffers from. A new cont
... Show MoreRoads irrespective of the type have specific standard horizontal distance measured at 90 degrees from a lot boundary to a development known as a setback. Non-observance of the recommended setbacks accommodated in any urban center’s master plan creates noise hazard to the public health and safety as the movement of vehicular traffic is not without the attendant noise. This study assessed noise intrusion level in shops along a section of Ibadan-Abeokuta road with due consideration to compliance with the recommended building structure setback. Analysis of noise descriptors evaluated in this study gave A-weighted equivalent sound pressure level average of 91.3 dBA, the daytime average sound level (LD) 92.27 dBA,
... Show MoreIn this paper a system is designed on an FPGA using a Nios II soft-core processor, to detect the colour of a specific surface and moving a robot arm accordingly. The surface being detected is bounded by a starting mark and an ending mark, to define the region of interest. The surface is also divided into sections as rows and columns and each section can have any colour. Such a system has so many uses like for example warehouses or even in stores where their storing areas can be divided to sections and each section is coloured and a robot arm collects objects from these sections according to the section’s colour also the robot arm can organize objects in sections according to the section’s colour.
<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More