he assignment model represents a mathematical model that aims at expressing an important problem facing enterprises and companies in the public and private sectors, which are characterized by ensuring their activities, in order to take the appropriate decision to get the best allocation of tasks for machines or jobs or workers on the machines that he owns in order to increase profits or reduce costs and time As this model is called multi-objective assignment because it takes into account the factors of time and cost together and hence we have two goals for the assignment problem, so it is not possible to solve by the usual methods and has been resorted to the use of multiple programming The objectives were to solve the problem of assignment of real data, which was approved by the Kut textile factory, where the data included two important factors, namely cost and time factors. The problem was solved in( Win-QSb) by the special methods of allocation problem. The results revealed that the cost of allocating workers to machines is (248.60) thousand dinars The allocation time is (202) hours and also the mathematical model was built for the problem of multi-objective assignment and its solution using multi-objective programming. The results showed that the allocation cost is (230) thousand dinars and allocation time is (162) hours, The above results show that multi-objective programming is better than special methods to solve assignment problems.
Developing and researching antenna designs are analogous to excavating in an undiscovered mine. This paper proposes a multi-band antenna with a new hexagonal ring shape, theoretically designed, developed, and analyzed using a CST before being manufactured. The antenna has undergone six changes to provide the best performance. The results of the surface current distribution and the electric field distribution on the surface of the hexagonal patch were theoretically analyzed and studied. The sequential approach taken to determine the most effective design is logical, and prevents deviation from the work direction. After comparing the six theoretical results, the fifth model proved to be the best for making a prototype. Measured results rep
... Show MoreThe research aims to know the impact of science, technology, engineering, and mathematics education on both creative thinking and mathematical achievement. To achieve it, the two researchers followed the quasi-experimental approach with an experimental design for two groups, one experimental and the other a control. The research sample consisted of (32) female students from the fourth scientific grade in Al-Intisar Preparatory School for Girls/ AlRasafa, First Directorate. The sample was chosen intentionally and was divided into two groups: a control group studying by the traditional method, their number (16), and an experimental group that applied the STEM approach, their number also (16). There was parity between the two research groups i
... Show MoreFar infrared photoconductive detectors based on multi-wall carbon nanotubes (MWCNTs) were fabricated and their characteristics were tested. MWCNTs films deposited on porous silicon (PSi) nanosurface by dip and drop coating techniques. Two types of deposited methods were used; dip coating sand drop –by-drop methods. As well as two types of detector were fabricated one with aluminum mask and the other without, and their figures of merits were studied. The detectors were illuminated by 2.2 and 2.5 Watt from CO2 of 10.6 m and tested. The surface morphology for the films is studied using AFM and SEM micrographs. The films show homogeneous distributed for CNTs on the PSi layer. The root mean square (r.m.s.) of the films surface roughness in
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreBackground: Imaging has a critical role in the diagnosis and evaluation of cardiac diseases, beginning with chest radiography and fluoro-scopy and progressing to coronary angio-graphy, echocardiography, nuclear medicine and recently multidetector computed tomo-graphy (MDCT) as well as magnetic resonance (MR) imaging
Objective: To highlight the role of Multi-detector CT in the evaluation of coronary artery disease and its importance of being noninvasive diagnostic technique.
Methods: A cross sectional study for 20 patients. Patients were asked to fast 6 hours prior to the examination and the patients with heart rates above 65 beats per minute were given cardio-
... Show More