Preferred Language
Articles
/
alkej-153
Enhancing Stud Arc Welding Technique Vai Utilizing FuzzyLogic Approach (FLA)
...Show More Authors

A fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used for verification corresponding with tensile strength as output results and this willconsider it as schema for other cases.The testing result in the case of crisp (exact) value verifyingied the uncertainty value of some criteria selected which open the concept to make the decision making process for some advance cases without implementation. This paper applied the proposed methodology using Matlab program, the graphic user interface (GUI) fuzzy tool box for the case study of screw DABOTEKSTUD welding machine, for 6 mm diameter stud. The sheet materials are (K14358 and K52355) according to (USN standards, and the stud materials are (54NiCrMoS6 and 4OCrMnMoS8-6) according to (DIN standards).This given information is very inevitable for the conventional crisp determination of the tensile stress for the particular specimens experimented and also for verifying the tensile test value estimate in the case of changing to a fuzzy value for two of the input variables.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of target cost technology in reducing product costs: Applied Study in the General Company for Soft Drinks Industry
...Show More Authors

The Research dealt with the role of the target costs in reducing the cost of products in the General Company for soft drinks. One the modern approaches reduce costs and thus increase the ability and continuity to compete in the market. Where the problem of research in identifying the shortcomings in the traditional method used in the company sample research. Which led to a weak control of the cost and the researcher relied on data and costs of the company. The research recommended that the target cost of the company should be applied to the research sample. Training the employees. In addition, preparing training courses for them. He stressed the need to address obstacles that prevent the existence of an effective cost system. Including t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology
...Show More Authors

Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Big-data Management using Map Reduce on Cloud: Case study, EEG Images' Data
...Show More Authors

Database is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 06 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Management using the Six Sigma approach to cost rationalization of activities : Application in the Iraqi mechanical carpet factory
...Show More Authors

The textile industries play a prominent role in reviving the national economy, but they are currently suffering from several problems, including the high costs of their activities, the low quality of their production processes, and accordingly, the hexagonal diffraction approach came to help analyze production activities to determine which of them are the most expensive and do not have a benefit or cost greater than Its benefit as a result of waste and losses that accompany its implementation. And by applying to the Iraqi mechanical carpet factory, the research reached several conclusions, the most important of which is the presence of several sources of waste and loss, such as activities and operations that do not add value, whi

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Structures
Accelerating reliability analysis of deteriorated simply supported concrete beam with a newly developed approach: MCS, FORM and ANN
...Show More Authors

Reliability analysis methods are used to evaluate the safety of reinforced concrete structures by evaluating the limit state function 𝑔(𝑋𝑖). For implicit limit state function and nonlinear analysis , an advanced reliability analysis methods are needed. Monte Carlo simulation (MCS) can be used in this case however, as the number of input variables increases, the time required for MCS also increases, making it a time consuming method especially for complex problems with implicit performance functions. In such cases, MCS-based FORM (First Order Reliability Method) and Artificial Neural Network-based FORM (ANN FORM) have been proposed as alternatives. However, it is important to note that both MCS-FORM and ANN-FORM can also be time-con

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Nov 29 2024
Journal Name
The Iraqi Geological Journal
Data Driven Approach for Predicting Pore Pressure of Oil and Gas Wells, Case Study of Iraq Southern Oilfields
...Show More Authors

Precise forecasting of pore pressures is crucial for efficiently planning and drilling oil and gas wells. It reduces expenses and saves time while preventing drilling complications. Since direct measurement of pore pressure in wellbores is costly and time-intensive, the ability to estimate it using empirical or machine learning models is beneficial. The present study aims to predict pore pressure using artificial neural network. The building and testing of artificial neural network are based on the data from five oil fields and several formations. The artificial neural network model is built using a measured dataset consisting of 77 data points of Pore pressure obtained from the modular formation dynamics tester. The input variables

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Efficient Task Scheduling Approach in Edge-Cloud Continuum based on Flower Pollination and Improved Shuffled Frog Leaping Algorithm
...Show More Authors

The rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Cybersecurity And Information Management
A New Automated System Approach to Detect Digital Forensics using Natural Language Processing to Recommend Jobs and Courses
...Show More Authors

A resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Aug 13 2021
Journal Name
Neural Computing And Applications
Integration of extreme gradient boosting feature selection approach with machine learning models: application of weather relative humidity prediction
...Show More Authors

View Publication
Scopus (67)
Crossref (57)
Scopus Clarivate Crossref