A Strength Pareto Evolutionary Algorithm 2 (SPEA 2) approach for solving the multi-objective Environmental / Economic Power Dispatch (EEPD) problem is presented in this paper. In the past fuel cost consumption minimization was the aim (a single objective function) of economic power dispatch problem. Since the clean air act amendments have been applied to reduce SO2 and NOX emissions from power plants, the utilities change their strategies in order to reduce pollution and atmospheric emission as well, adding emission minimization as other objective function made economic power dispatch (EPD) a multi-objective problem having conflicting objectives. SPEA2 is the improved version of SPEA with better fitness assignment, density estimation, and modified archive truncation. In addition fuzzy set theory is employed to extract the best compromise solution. Several optimization run of the proposed method are carried out on 3-units system and 6-units standard IEEE 30-bus test system. The results demonstrate the capabilities of the proposed method to generate well-distributed Pareto-optimal non-dominated feasible solutions in single run. The comparison with other multi-objective methods demonstrates the superiority of the proposed method.
The environmental cost management focus on continuous improvement of processes and the various activities of the organization in order to improve the environmental performance by producing an environmentally friendly products lead to a competitive advantage for the organization and supports the activities of their sustainability.
The study was carried out in Bagel cement factory, one of the pioneer projects in Yemen in manufacturing field, The study found the need to develop a separate section for environmental management in order to put plans and environmental policies and the introduction of a special division in the Department of costs cares about Management practices cost and measure environmental costs, also give solu
... Show MoreA shocking third species emerged from a family of coronaviruses (CoV) in late 2019 following viruses causing SARS (Severe Acute Respiratory Syndrome-CoV) in 2003 and MERS (Middle East Respiratory Syndrome-CoV) in 2012; it’s a novel coronavirus now called severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2; formerly called 2019-nCoV). First emerging in China, it has spread rapidly across the globe, giving rise to significant social and economic costs and imposing severe strain on healthcare systems. Since many attempts to control viral spread has been futile, the only old practice of containment including city lockdown and social distancing are working to some extent. Unfortunately, specific antiviral drugs and vaccines remain u
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
This study concerns the removal of a trihydrate antibiotic (Amoxicillin) from synthetically contaminated water by adsorption on modified bentonite. The bentonite was modified using hexadecyl trimethyl ammonium bromide (HTAB), which turned it from a hydrophilic to a hydrophobic material. The effects of different parameters were studied in batch experiments. These parameters were contact time, solution pH, agitation speed, initial concentration (C0) of the contaminant, and adsorbent dosage. Maximum removal of amoxicillin (93 %) was achieved at contact time = 240 min, pH = 10, agitation speed = 200 rpm, initial concentration = 30 ppm, and adsorbent dosage = 3 g bentonite per 1L of pollutant solution. The characterization of the adsorbent, modi
... Show MoreThe performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to resul
... Show MoreIn the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonic
... Show MoreAbstract
Toady technology Nano since it launched human Alivia third interest and anticipation unusual and that by the decision-makers in the world's governments and its institutions and research departments productivity, especially after the US Congress enact a law (the National Initiative for Tknlojba nanotechnology in the United States of America) and the allocation of large sums of money To support this initiative, the research aims to shed light on the concept of technology nanotechnology, which is technology atheist and the twentieth century, and reflect its economic importance and in order to reach the objectives of the research has been the division of research into several axes has been allocated
... Show MoreThe proposal of nonlinear models is one of the most important methods in time series analysis, which has a wide potential for predicting various phenomena, including physical, engineering and economic, by studying the characteristics of random disturbances in order to arrive at accurate predictions.
In this, the autoregressive model with exogenous variable was built using a threshold as the first method, using two proposed approaches that were used to determine the best cutting point of [the predictability forward (forecasting) and the predictability in the time series (prediction), through the threshold point indicator]. B-J seasonal models are used as a second method based on the principle of the two proposed approaches in dete
... Show MoreBackground: Type 2 diabetes mellitus is a condition characterized by an elevation of oxidative stress, which has been implicated in diabetic progression and its vascular complications. Aim: Assessing the impact of gliclazide modified release (MR) versus glimepiride on oxidative stress markers, glycemic indices, lipid profile, and estimated glomerular filtration rate in uncontrolled type 2 diabetic patients on metformin monotherapy. Methods: This was an observational comparative study conducted in Thi-Qar specialized diabetic, endocrine, and metabolism center. Sixty-six patients were randomized into two groups based on the addition of the sulfonylureas (SUs). Group 1 (33 patients) was on gliclazide MR, whereas Group 2 (33 patients)
... Show MoreData security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show More