Preferred Language
Articles
/
jeasiq-119
Solving a three dimensional transportation problem using linear programming
...Show More Authors

Transport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,979.4$) or approximately (33,747,425 ) million diners Compared to the total cost of the company (310,116.59$) or approximately (38,764,573.75) million diners, as well as this only Models achieves a profit of (40137.19$) dollars or approximately (5,017,148.75) million diners.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
The problem and its manifestations with the modernists through the Iberissian systems in modern terminology (applied study): (Applied study)
...Show More Authors

Islamic law has relied on a number of sources in order to denote the rulings issued by them, including what is original and what is sub, and it is known to all scholars, that the Prophet's Sunnah is the second major source after the Koran, which separated the overall and devoted its year and restricted absolute. God Almighty obeyed the owner and his followers, and that his obedience of obedience to God Almighty said: (Who obeys the messenger has obeyed God) (women: 80), and then between the peasant who believes in him and his victory and follow him, he said: (and he said: And the one who was revealed with them were the successful ones (al-A'raf: 157).
     It is known that the Sunnah commanded to follow is the

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 02 2011
Journal Name
Ibn Al-haithem Journal For Pure And Applied Sciences
On modified pr-test double stage shrinkage estimators for estimate the parameters of simple linear regression model
...Show More Authors

Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Linear Increasing in Radial Electronic Density Distribution for K and L Shells throughout Some Be-Like Ions
...Show More Authors

Maximum values of one particle radial electronic density distribution has been calculated by using Hartree-Fock (HF)wave function with data published by[A. Sarsa et al. Atomic Data and Nuclear Data Tables 88 (2004) 163–202] for K and L shells for some Be-like ions. The Results confirm that there is a linear behavior restricted the increasing of maximum points of one particle radial electronic density distribution for K and L shells throughout some Be-like ions. This linear behavior can be described by using the nth term formula of arithmetic sequence, that can be used to calculate the maximum radial electronic density distribution for any ion within Be like ions for Z<20.

View Publication Preview PDF
Crossref
Publication Date
Fri Aug 17 2001
Journal Name
Molecular Crystals And Liquid Crysta
Synthesis, characterization and study of mesomorphic behavior of new bent and linear core compounds containing heterocyclic rings
...Show More Authors

The article presents the synthesis and liquid crystalline properties of some of new bent and linear core compounds containing a 1,3,4-oxadiazole, piperazine and thiazolidin-4-one rings as a central core. The new synthesized compounds were characterized by elemental analysis and FTIR, ¹HNMR and mass spectroscopy). The liquid crystalline properties were studied by polarized optical microscopy and differential scanning calorimetry. All Schiff bases compounds with 1,3,4-oxadiazole and piprzaine ring in central core presented liquid crystalline properties. The liquid crystallinity of compounds containing 1,3,4-oxadiazole and thiazolidin-4-one rings as a central core were found depending on the type of terminal substituents.

Publication Date
Tue Dec 01 2020
Journal Name
Iraqi Journal Of Physics
Comparative study of the linear and nonlinear optical properties for different Iraqi heavy and light crude oils
...Show More Authors

Iraqi oil crudes have some of the physical and chemical characteristics that distinguish it from other types of oil crudes in the world. Some of these features such us molecular composition, rheological, viscosity and emulsions are studied carefully by researchers. In this work, a comparative study of the linear and the non-linear optical properties for typical heavy and light crude oils of Iraqi origin was studied utilizing Z-scan technique. The He -Ne laser of wavelength 632.8 nm had been used for this purpose. These samples were collected from Basra and Kut oil fields. The values of the non-linear refractive index (n2), non-linear absorption coefficient (β), and third-order electrical susceptibility (χ3) were e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Multistage and Numerical Discretization Methods for Estimating Parameters in Nonlinear Linear Ordinary Differential Equations Models.
...Show More Authors

Many of the dynamic processes in different sciences are described by models of differential equations. These models explain the change in the behavior of the studied process over time by linking the behavior of the process under study with its derivatives. These models often contain constant and time-varying parameters that vary according to the nature of the process under study in this We will estimate the constant and time-varying parameters in a sequential method in several stages. In the first stage, the state variables and their derivatives are estimated in the method of penalized splines(p- splines) . In the second stage we use pseudo lest square to estimate constant parameters, For the third stage, the rem

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Use aggregate slide estimate additive splines estimation for the diagnosis of non-linear composite model self-regression with practical application
...Show More Authors

Nonlinear time series analysis is one of the most complex problems ; especially the nonlinear autoregressive with exogenous variable (NARX) .Then ; the problem of model identification and the correct orders determination considered the most important problem in the analysis of time series . In this paper , we proposed splines  estimation method for model identification , then we used three criterions for the correct orders determination. Where ; proposed method used to estimate the additive splines for model identification , And the rank determination depends on the additive property  to avoid the problem of curse dimensionally . The proposed method is one of the nonparametric methods , and the simulation results give a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sun Mar 31 2024
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Using Solid Waste as A Substitute for Raw Materials in Construction: A Review.
...Show More Authors

The main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative

... Show More
View Publication
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology &amp; Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref