Flow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relatively high for 2015-2016-2017. 2018 was utilized as a test year to assess the modeling work and validate the experimental results. In the second step, the artificial neural networks approach employs the python program as an AI, and the affinity ratio of real data using the performance measurement of the mean absolute error (MAE) was 0.005. To improve and reduce the value of absolute error, the genetic algorithm uses the python program and the convergence ratio became 0.001. It inferred that the algorithm is efficient in improving results. Thus, the genetic algorithm provided better results with fewer errors than the neural network alone. This concludes that the shown network has superior performance over others and the possibility of its long-term predictions for 2030. A Sing time series helped detect future cases by reading and inferring system data. The development of appropriate work plans will lower internal and external expenses of the systems and help integrate other capabilities by giving correct data sources of raw materials, costs, etc. To facilitate prediction for maintenance workers, an interface has been created that facilitates users to apply them using the python program represented by entering the times, an hour, a day, a month, a year, to predict the type and place of failure.
The UV−VIS absorption spectroscopy technique was used to study the formation of a new complex of charge transfer (CT) between bioactive organic molecules as (Nystatin) containing both a π-electrons from a conjugated system and lone-pair of electrons (amine) with Tetrachloro-1,4 benzoquinone (TCBQ) as a π-acceptor in which the transferred electron goes into its vacant anti-bonding molecular orbitals. The Tyrian purple-colored complex formed was quantitatively measured at 544 nm. This complex shows obeying Beer's law within the concentration range of (10-90) μg.ml-1The stoichiometry of the formed complex between the (Nys.) and (TCBQ) was found 1:2 as evaluated by continuous variation (Job's method) and mole ratio method The value of mola
... Show More
Abstract:
The models of time series often suffer from the problem of the existence of outliers that accompany the data collection process for many reasons, their existence may have a significant impact on the estimation of the parameters of the studied model. Access to highly efficient estimators is one of the most important stages of statistical analysis, And it is therefore important to choose the appropriate methods to obtain good estimators. The aim of this research is to compare the ordinary estimators and the robust estimators of the estimation of the parameters of
... Show MoreEducation quality evaluation is one of the objectives of education quality. The evaluation includes assessing the education standards and academic program outcomes to develop intellectual, scientific and practical concepts for the educational structure. It considers the determination of the rates of the number of accepted students and graduates. The research focuses on "what are the levels of education quality according to the evaluation mechanisms in the design department" to enhance the quality system and the objectives of theoretical and applied education.
It is identifying the levels of education quality and evaluating it according to the numbers and rates of graduate students of the design department branches for morning and ev
Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MorePurpose: The research seeks to develop the implications of intellectual human capital, and social capital in business organizations, and will be accomplished on three levels, the first level (the level of description) to identify, diagnose and display content philosophical Strategic Human Resource Management at the thought of modern administrative represented by human capital and Ras social capital. The second level (level of analysis) and the analysis of the extent of the impact of alignment between human capital, and social capital in the organizational strength of the organizations. The third level (Level predict) the formulation of a plan to strengthen the organizational strength in business organizations and to develop speci
... Show MoreDBN Rashid, Asian Quarterly: An International Journal of Contemporary Issue, 2018
Due to the importance of nanotechnology because of its features and applications in various fields, it has become the focus of attention of the world and researchers. In this study, the concept of nanotechnology and nanomaterials was identified, the most important methods of preparing them, as well as the preparation techniques and the most important devices used in their characterization.
The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreThe application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show More