The main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowing and expecting the future running of the system to enhance the controllability of the system production and improve the production system and machine efficiency. Moreover, built an experiment-real model in Arena in order to control the system in term of production and process. First step is to collect the statistical data required for analysis in terms of input and output data for analysis. Second, is to track the production problem in term of process bottleneck in order to improve the utilization of the system. Third is to validate the model in order to overcome the product demand of the system uncontrollability. Through the result analysis of waiting time and production rate, it is clearly shown that system is stable with a need to resetting the capacity as a chance for the improvement, regarding to resources utilization. Re-planning resources capacity positively enhances the production and profitability of the system.
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
The main objective of this study is to describe the preparation of topographic maps using the Surfer software. A total of 159 regularly distributed Ground Control Points (GCPs) were collected with the use of the Differential Global Positioning System (DGPS). Seven methods (Contour Map, Post Map, 3D Surface Map, 3D Wireframe Maps, Grid Vector-1 Map, Color Relief Map, and Shaded Relief Maps) at the Surfer environment were used to prepare the topographic maps at the Mukhtar Village near the Al-Fallujah City. Contour lines with other features were superimposed on the DEM layer, which refers to the topography of the terrain inside this study area. The accuracy of the database's results was estimated, essential maps were given, and the re
... Show MoreThis study aims to highlight the role of financial control in the development of government performance through the use of "GFS" system and its application in the service of government units, which will help them in how to use financial resources efficiently through the quality of accounting information provided by this system in the financial statements that reflect the predictability in that fiscal policy of the state through government programs and activities fee as well as to identify weaknesses and address them quickly in order to avoid wastage and loss of public money, which leads to the possibility of utilization of available financial resources of the state to effectively and efficiently, has been reached that the failure of gove
... Show MoreIn the present investigation two different types of fiber reinforced polymer composites were prepared by hand lay-up method using three different parameters (curing temperature, pressing load and fiber volume fraction). These composites were prepared from the polyester resin as the matrix material reinforced with glass fibers as first group of samples and mat Kevlar fibers as the second group, both with different volume fractions (4%, 8%, and 12%) of fibers. They were then tested by tensile strength and impact strength. The main objective in this study is to use Taguchi method for predicting the better parameters that give the better tensile and impact strength to the composites, and then preparing composites at
... Show MoreThe objective of the research is to evaluate the risk management practices of the variables (risk management structure, risk management methods, key components of risk management) and their relation to the principled behavior of managers behavior(innovation, proactive, risk acceptance) By adopting the questionnaire as a main tool in collecting data from managers in the National and raq insurance companies of (50) officials Department manager, department administrator, unit administrator, and analyzed their answers using the SPSS In calculating arithmetic mean, standard deviation, percentage weight and simple correlation coefficient. The most prominent conclusions were:1.There is a positive trend in the sample in both companies and a high
... Show MoreThis study focused on the role and importance of alkaloid compounds in Punica granatum peels which is one of many wide distribution medicinal fruits. Two kinds of pathogenic fungi were isolated from patients in Baghdad to be tested, also a type of extracts was prepared, alkaloids were isolated and partially purified and detected by two ways, a classic depended technique also used for determine these alkaloids, results showed an observed differences among extracts or treatments towards the fungi samples. So this study was one of the scientific applications to find natural alternative compounds that inhibit the growth of several pathogenic organisms that cause dangers and harms for human health.
Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreFrom 1979 to 1999 several theatricl groups had produced (Mackbeth) by shakespear which were directed by different director and the role being played by different actors. So the questions are: How did those a Iraqi actors approach that character by their performance? Did they interpret the character Truelly as the poet wanted to be. The researcher aims to find out the true performance by the actor who impersonate (mackbeth) as a wicked personality, who had un rational ambition. The researcher also aims to expose the style of acting fallowed by the Iraqi actors in that play. In chapter of review of literature, The researcher discusses the weaning and procedure of the actor performance which include characterization and transformation. He a
... Show More