The main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowing and expecting the future running of the system to enhance the controllability of the system production and improve the production system and machine efficiency. Moreover, built an experiment-real model in Arena in order to control the system in term of production and process. First step is to collect the statistical data required for analysis in terms of input and output data for analysis. Second, is to track the production problem in term of process bottleneck in order to improve the utilization of the system. Third is to validate the model in order to overcome the product demand of the system uncontrollability. Through the result analysis of waiting time and production rate, it is clearly shown that system is stable with a need to resetting the capacity as a chance for the improvement, regarding to resources utilization. Re-planning resources capacity positively enhances the production and profitability of the system.
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreIn this paper , concrete micro-piles were used to improve the bearing capacity of the soil which is supporting the shallow foundation by using groups of (4; 6 and 9)bored short micro-piles which have, (D=0.125m and D=0.1m), and length to diameter ratio (L/D) equal to (6; 10 and 12) respectively. To calculate the bearing capacity of the micro-piles,(Tomlinson) and (Lamda) methods were used; also the soil properties were taken from Al-Muthana airport,(Al-Qyssi,2001) [1]. The results show that; increasing the number of piles and/ or the diameters and lengths; and the interaction between the bearing capacity of the shallow foundation with the bearing capacity of the pile group which leads to increasing the strength against the external loads
... Show MoreThis work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.
Abstract:
This research aims to identify the actual reality of the supply chain processes applied in the Noor Al-Kafeel Food Products Company, which was chosen as a research sample by measuring the application and documentation gap. The current research relies on the case study method to reach the desired results, and the seven-scale scale was relied on to identify the reality of the supply chain operations applied in the researched company and the use of quantitative and qualitative methods in data collection and analysis, as quantitative methods such as the arithmetic mean were used weighted, percentage measurement, and g
... Show MoreA demonstration of the inverse kinematics is a very complex problem for redundant robot manipulator. This paper presents the solution of inverse kinematics for one of redundant robots manipulator (three link robot) by combing of two intelligent algorithms GA (Genetic Algorithm) and NN (Neural Network). The inputs are position and orientation of three link robot. These inputs are entering to Back Propagation Neural Network (BPNN). The weights of BPNN are optimized using continuous GA. The (Mean Square Error) MSE is also computed between the estimated and desired outputs of joint angles. In this paper, the fitness function in GA is proposed. The sinwave and circular for three link robot end effecter and desired trajectories are simulated b
... Show MoreOily wastewater is one of the most challenging streams to deal with especially if the oil exists in emulsified form. In this study, electrospinning method was used to prepare nanofiberous polyvinylidene fluoride (PVDF) membranes and study their performance in oil removal. Graphene particles were embedded in the electrospun PVDF membrane to enhance the efficiency of the membranes. The prepared membranes were characterized using a scanning electron microscopy (SEM) to verify the graphene stabilization on the surface of the membrane homogeneously; while FTIR was used to detect the functional groups on the membrane surface. The membrane wettability was assessed by measuring the contact angle. The PVDF and PVDF / Graphene membranes efficiency
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show More