The emphasis of Master Production Scheduling (MPS) or tactic planning is on time and spatial disintegration of the cumulative planning targets and forecasts, along with the provision and forecast of the required resources. This procedure eventually becomes considerably difficult and slow as the number of resources, products and periods considered increases. A number of studies have been carried out to understand these impediments and formulate algorithms to optimise the production planning problem, or more specifically the master production scheduling (MPS) problem. These algorithms include an Evolutionary Algorithm called Genetic Algorithm, a Swarm Intelligence methodology called Gravitational Search Algorithm (GSA), Bat Algorithm (BAT), Teaching Learning Based Algorithm and Harmony Search Algorithm (GA, TLBO and HS). This segment of the research constitutes of two parts the first emphasises on the outcome of the five simulation algorithms and then identifies the best, while the second part is about comparing the best with the search algorithm work in 2009, the applicability of BAT Algorithm and Gravitational Search Algorithm (GSABAT) to planning problems, the technique used for calculating master production scheduling, and the very important results and recommendations for future studies
Intrinsic viscosities have been studied for polyethylene oxide in water which has wide industrial applications. The polyethylene oxide samples had two different structures, the first one was linear and covers a wide range of molecular weight of 1, 3, 10, 20, 35, 99, 370, 1100, 4600, and 8000 kg/mol and the second one was branched and had molecular weights of 0.55 and 40 kg/mol.
Intrinsic viscosities and Huggins constants have been determined for all types and molecular weights mentioned above at 25ºC using a capillary viscometer. The values of Mark-Houwink parameters (K and a) were equal to 0.0068 ml/g and 0.67 respectively, and have not been published for this range of molecular weight in as yet.
In this study, NaOH dissolution method was applied to dissolve cellulose fibers which extracted from date palm fronds (type Al-Zahdi) taken from Iraqi gardens. In this process, (NaOH)-solution is brought into contact with the cellulose fibers at low temperature. Experiments were conducted with different concentrations of NaOH (4%, 6%, 8% and12%) weight percent at two cooling bath temperatures (-15 oC) and (-20oC). Maximum cellulose dissolution was 23 wt% which obtained at 8 wt% concentration of NaOH and at cooling bath temperature of -20oC. In order to enhance the cellulose fibers dissolution, the sample was pretreated with Fenton's reagent which consists of
... Show MoreIn this study, NaOH dissolution method was applied to dissolve cellulose fibers which extracted from date palm fronds (type Al-Zahdi) taken from Iraqi gardens. In this process, (NaOH)-solution is brought into contact with the cellulose fibers at low temperature. Experiments were conducted with different concentrations of NaOH (4%, 6%, 8% and12%) weight percent at two cooling bath temperatures (-15 oC) and (-20oC). Maximum cellulose dissolution was 23 wt% which obtained at 8 wt% concentration of NaOH and at cooling bath temperature of -20oC. In order to enhance the cellulose fibers dissolution, the sample was pretreated with Fenton's reagent which consists of hydrogen peroxide (H2O2), oxalic acid (C2H2O4) and ferrous sulfate (FeSO4). This
... Show MoreIn this study, NaOH dissolution method was applied to dissolve cellulose fibers which extracted from date palm fronds (type Al-Zahdi) taken from Iraqi gardens. In this process, (NaOH)-solution is brought into contact with the cellulose fibers at low temperature. Experiments were conducted with different concentrations of NaOH (4%, 6%, 8% and12%) weight percent at two cooling bath temperatures (-15 oC) and (-20oC). Maximum cellulose dissolution was 23 wt% which obtained at 8 wt% concentration of NaOH and at cooling bath temperature of -20oC. In order to enhance the cellulose fibers dissolution, the sample was pretreated with Fenton's reagent which consists of
... Show MoreThe present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.
Face detection is one of the important applications of biometric technology and image processing. Convolutional neural networks (CNN) have been successfully used with great results in the areas of image processing as well as pattern recognition. In the recent years, deep learning techniques specifically CNN techniques have achieved marvellous accuracy rates on face detection field. Therefore, this study provides a comprehensive analysis of face detection research and applications that use various CNN methods and algorithms. This paper presents ten of the most recent studies and illustrate the achieved performance of each method.
Multipoint forming process is an engineering concept which means that the working surface of the punch and die is produced as hemispherical ends of individual active elements (called pins), where each pin can be independently, vertically displaced using a geometrically reconfigurable die. Several different products can be made without changing tools saved precious production time. Also, the manufacturing of very expensive rigid dies is reduced, and a lot of expenses are saved. But the most important aspects of using such types of equipment are the flexibility of the tooling. This paper presents an experimental investigation of the effect of three main parameters which are blank holder, rubber thickness and forming speed th
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis study dealt with the reality of groundwater before Sulfur production in the Al-Mishraq field-1 and after production stopped in the field, by measuring the groundwater table for (44) wells in 2021, and comparing it to the groundwater table measured by the Polish company Centrozap in 1971, the groundwater table was a range between (187.71-205.8)m in 1971, but in 2021 it ranged was between (188.51-196.55)m.
Maps of the groundwater movement and water table were created using these data. It turned out that there was little change in the direction of groundwater flow; in both cases, the flow is from the west and northwest towards the east with a slight slope toward the southeast and the Tigris River. As for hydraulic properties, it w
Praise be to Allah. Praise be to Him. We seek refuge in Him. We seek forgiveness from him. We seek forgiveness from him.
And the disadvantages of our actions, of his hands
e
It is important, if not all, to pay tribute to God
Muhammad Abdo and Rasoulou, there is no way to deprive the nation of the weakness of God alone and not to share it
Which suffer from the Quran, and the loss of its borders, bad
The work did not work and did not improve
Do what they offer and delay the others, except by reference to this Koran and the extraction of treasures and secrets
And news.
The Great Quran Study
Lu Imito ordered each poisoned, and achieved several targets of
YEMYA: Knowing the secrets of the Grea