Preferred Language
Articles
/
QRd9wpIBVTCNdQwCRL_4
قياس وتحليل متطلبا (التخطيط والدعم) على وفق المواصفةIATF 16949: 2016 / دراسة حالة في الشركة العامة لصناعة السيارات والمعدات
...Show More Authors

The article is final after making all the modifications. 2,259 / 5,000 يهدف البحث إلى قياس وتحليل الفجوة بين الواقع الفعلي لبنود التخطيط والدعم وفق المواصفة (IATF16949:2016) في مصنع البطاريات أحد مصانع الشركة العامة لصناعة وتجهيز السيارات، وكذلك التعرف على نقاط القوة والضعف لبنود التخطيط والدعم وفق المواصفة محل البحث. ينطلق البحث من حاجة الشركة العامة لصناعة وتجهيز السيارات إلى إتباع المعايير العالمية في صناعة السيارات والمنتجات المرتبطة بها، إذ تم اختيار معمل بطاريات السيارات في بغداد الوزيرية أحد مصانع الشركة المبحوثة كعينة للبحث، ونظراً لكثرة متطلبات المواصفة المبحوثة فقد تم إدخال فقرات التخطيط والدعم في نظام إدارة جودتها، إذ تم إستخدام قائمة المراجعة والتي تضمنت ثمانية محاور (إجراءات معالجة المخاطر، أهداف الجودة والتخطيط لتحقيقها، تخطيط التغيير، الموارد، الكفاءة، التوعية، الإتصال، والمعلومات الموثقة)، والتي تندرج ضمن متطلبات فقرات التخطيط والدعم وفقاً للمواصفة المبحوثة، وتم إعتماد مجموعة من الأساليب الإحصائية منها (المتوسط ​​الحسابي المرجح، القياس النسبي، قياس حجم الفجوة). توصل البحث إلى وجود فجوة بين الواقع الفعلي للمصنع المبحوث وبنود التخطيط والدعم وفق المواصفة IATF16949:2016، حيث بلغت الفجوة الكلية (74%) لبند التخطيط، و(55%) لبند الدعم، وتعود هذه الفجوة إلى أسباب عديدة، تم تشخيصها في نقاط ضعف، حيث بلغت نسبة التنفيذ والتوثيق (26%) لبند التخطيط، و(45%) لبند الدعم، وتعود تلك النسبة إلى نقاط القوة التي تم تشخيصها لكل من بنود التخطيط والدعم، وتمت مراجعة قوائم المراجعة وفقاً لمتطلبات بنود التخطيط والدعم وذلك للوقوف على الواقع الفعلي في المصنع المبحوث، وتعزيز جوانبه الإيجابية التي حققت أعلى معدلات التطبيق والتوثيق، والسعي إلى إزالة الجوانب السلبية التي حققت أدنى معدلات التطبيق والتوثيق.

Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
Alternative Sanctions and their Impact on Societal Security: A Field Study in the Directorate of Juveniles Reformatory in Baghdad
...Show More Authors

Crime is one of the most severe challenges facing States, and strives to find preventive measures, reduce its seriousness, and prevent them; due to developments, crimes have increased, and emerging new patterns of crimes, there is an urgent need to prevent crimes and reduce their effects. Modernizing its punitive system and diverting it to correctional rehabilitative justice to redress the prejudice caused by the crime and rehabilitate the convicted person by using alternative measures to short-term imprisonment. This research emphasizes alternative sanctions' value to minimizing short-term imprisonment penalties and their impact on societal security through several goals like, the negative consequences, justifications, and alternatives

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Knowledge Management in Small Project Management Afield Study in Oxygen Ahli Plant in Iraq
...Show More Authors

       Most of the literature on the management and application terkzat waved the last period on large organizations was the negligence  of  knowledge management in small organizations where research aims to find out knowleddge management, small projects  In oxygen Ahli plant in Iraq, and the fact the role of knowledge management in small projects from the standpoint of employees in order to achieve this used production method results.  The results showed that knowledge management has a role in the high level of productivity during the years 2010-2013. The results showed that knowledge management has a role in the high level of productivity during the years 2

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
A Comparative Study on Association Rule Mining Algorithms on the Hospital Infection Control Dataset
...Show More Authors

Administrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Fast Processing RNA-Seq on Multicore Processor
...Show More Authors

RNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Windows-Based Special Applications Router
...Show More Authors

The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Optimum Median Filter Based on Crow Optimization Algorithm
...Show More Authors

          A novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability
...Show More Authors

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Body parts idioms; across-cultural significance
...Show More Authors

0

View Publication Preview PDF