The main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowing and expecting the future running of the system to enhance the controllability of the system production and improve the production system and machine efficiency. Moreover, built an experiment-real model in Arena in order to control the system in term of production and process. First step is to collect the statistical data required for analysis in terms of input and output data for analysis. Second, is to track the production problem in term of process bottleneck in order to improve the utilization of the system. Third is to validate the model in order to overcome the product demand of the system uncontrollability. Through the result analysis of waiting time and production rate, it is clearly shown that system is stable with a need to resetting the capacity as a chance for the improvement, regarding to resources utilization. Re-planning resources capacity positively enhances the production and profitability of the system.
Corruption has become the subject of great interest, and the subject of research and scrutiny in recent years, because of its penetration in all fields of life, whether these fields are political, economic, social, and administrative. It is one of the biggest challenges and problems that are facing communities. Therefore, this study is focused on the evaluation of measures implementing the national strategy to combat corruption in Iraq.
This study was launched, first because of its intellectual dimensions to ensure a conceptual presentation of the strategy and operational management in general with a special focus on the processes of implementation and control str
... Show MoreAny software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show MoreContemporary art has been widely affected by technology, and ceramics production is no exception. As an ancient art that originates from clay and other humble materials found in the ground, ceramics is considered one of the most adaptable art forms. Once it is realised how flexible ceramics as a material is, it can be easily altered into endless forms and shapes. Therefore, it is vital for ceramics practitioners to find a relationship between this wonderful material and the media of contemporary art, culture and modelling software or technology in general so that they can take their deformable art pieces to a whole new level. Such a relationship is worth investigating. Thus, for the purposes of this research, several ceramic pieces were
... Show MoreThe electronic payment systems are considered the most important infrastructure for the work of banks, particularly after a steady and remarkable development in information and communication technology, Which created the reality of the work of the infrastructure for these systems and these systems also become one of the most important components of infrastructure for the work of banks, cause it is one of the most important channels through which the transfer of cash, financial instruments between financial institutions in general and banking in particular.
In order to achieve the objectives of the research, the most important to identify the concept of electronic payment systems, and its divisions, and th
... Show MoreOne of the globalization results is (VAT) , so it is important to consider its results and impact on the tax system.
The Iraqi economy having wittnisd an acute transition period , still in need for a better care in aim to back it, especialy from the tax system.
The research is concerned with the (VAT) and its details –And for five chapters all the problomes connect are displayed .But yet the new system does not comply with the modern development and this is one of the defects of (VAT) in Iraq.
The history of (VAT)was also studied mentiorned and studied.
As a conclusion (VAT) is one of the m
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreTraining and retraining of teachers have become a central issue in Iraq recently especially in-service training of English teachers on the new curricula (Iraq opportunities). English teachers should be objectively evaluated and assessed.
A sample of (40) trained teachers of English is included in the study and a questionnaire is used as the main instrument of the study.
The main findings of the study were the following:
1. The trainees were serious in training on the new course (item 6) the programme helped increase their information (item 4) and motivate them towards better teaching (item 3). The aims of the programme were clear (item1). The programme helped develop their teaching skills (item 2) and was comprehensive (item 5).