Do you want to publish a course? Click here

نموذج للبرمجة الخطية لحركة نقل الحجاج من عرفـات إلى مزدلفة (الإفاضة )

835   1   30   0 ( 0 )
 Publication date 2003
  fields Economy
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

No English abstract

References used
د. محمد سالم الصفدي : البرمجة الخطية وبحوث العمليات. الكويت، 1985
د. صباح الدين بقجه جي - د. خلف مطر الجراد: بحوث العمليات، جامعة دمشق 1990
د. إبراهيم العلي: بحوث العمليات، جامعة تشرين 1991
rate research

Read More

This paper presents one of the most accurate, stable and fast to response advanced control system (PROPORTIONAL INTEGRAL DIFFERENTIAL CONTROL SYSTEM), which considered one of the special cases of closed loop control systems. Also, display and compare different forms of control and response of sub modes of PID controller, through using programmable logical controller and programmed it to be (PID) controller, and take advantage of this system for accurate control of the three phase motor speed. In addition, the PLC program is been connected to monitoring and collecting data software, known by acronym (SCADA) for calibration of (PID) and use this software to display the result of the responses for the different types of the controller PID in the form of graphic curves. These response curves show accuracy and fast to response that make this application an integrated system that could be form the infrastructure of many practical applications like large cranes, overlapping product lines and different other applications and the use of PLC systems make them high quality and high reliability systems.
In our thesis, we present many previous approaches for mapping BPMN to BPEL. Moreover, we compare between their own strengths and weaknesses. Then we offer our new approach based on ESHUIS-GREFEN2 algorithm. We develop this algorithm to accept BPMN a s input and BPEL as output. In addition, we solve the synchronization problem in ESHUIS algorithm by adding algorithm to find and process cross-synchronization links between parallel branches. We evaluated our approach by doing two case studies and comparing the results with other approaches and implementations.
Studies and research about rhetoric have varied concerning the definition of rhetoric, but most of them look at rhetoric from on side only. Rhetoric was classified as being a kind of research concerned with the art of persuasion in its techniques, means and components. But it is certain that the political and social conditions of the greak life, led these philosophical studies and linguistic research especially, rhetoric. This made Aristotle divide rhetoric into three sections. The research delt with two main titles, the first one was Rhetoric according to Aristotle. It combines between mans ability to speak and express on one hand becavse man is a speaker and expressor who naturally looks for persuasion. In his speech, he tries to convince as many people as possible. To do this, he uses many instinctive means. Aristotle was concerned with rhetoric due to its mental and psychological sides. He tried to find a kind of balance between the means of persuasion and means of influence. He made convincing help infuencing. He diffentiated between kinds of proofs, the made proofs and the non made proofs. The other ones were the base of the rhetoric structure for Aristotle. The argumentative linguistic text is different from other texts that it builds an interactive structure based on some means that aim to persuade and affect the recipient.
The transformer-based pre-trained language models have been tremendously successful in most of the conventional NLP tasks. But they often struggle in those tasks where numerical understanding is required. Some possible reasons can be the tokenizers a nd pre-training objectives which are not specifically designed to learn and preserve numeracy. Here we investigate the ability of text-to-text transfer learning model (T5), which has outperformed its predecessors in the conventional NLP tasks, to learn numeracy. We consider four numeracy tasks: numeration, magnitude order prediction, finding minimum and maximum in a series, and sorting. We find that, although T5 models perform reasonably well in the interpolation setting, they struggle considerably in the extrapolation setting across all four tasks.
Deep neural networks for natural language processing are fragile in the face of adversarial examples---small input perturbations, like synonym substitution or word duplication, which cause a neural network to change its prediction. We present an appr oach to certifying the robustness of LSTMs (and extensions of LSTMs) and training models that can be efficiently certified. Our approach can certify robustness to intractably large perturbation spaces defined programmatically in a language of string transformations. Our evaluation shows that (1) our approach can train models that are more robust to combinations of string transformations than those produced using existing techniques; (2) our approach can show high certification accuracy of the resulting models.

suggested questions

comments
Fetching comments Fetching comments
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا