Preferred Language
Articles
/
jeasiq-128
Determine Optimal Preventive Maintenance Time Using Scheduling Method
...Show More Authors

In this paper, the reliability and scheduling of maintenance of some medical devices were estimated by one variable, the time variable (failure times) on the assumption that the time variable for all devices has the same distribution as (Weibull distribution.

The method of estimating the distribution parameters for each device was the OLS method.

The main objective of this research is to determine the optimal time for preventive maintenance of medical devices. Two methods were adopted to estimate the optimal time of preventive maintenance. The first method depends on the maintenance schedule by relying on information on the cost of maintenance and the cost of stopping work and access to the optimum time for maintenance, which achieves the lowest costs. The second method depends on the reliability function, which was to determine the optimal maintenance period, which then cost less Can. We also proved through this research that the method of scheduling is better than the method of relying on the reliability function because it depends heavily on the cost of maintenance.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Crossref
Publication Date
Sat Aug 30 2025
Journal Name
Iraqi Journal Of Science
Improving the Performance and Finding Bitmap of the Compression Method Using Weber's law
...Show More Authors

Image compression is a suitable technique to reduce the storage space of an image, increase the area of storage in the device, and speed up the transmission process. In this paper, a new idea for image compression is proposed to improve the performance of the Absolute Moment Block Truncation Coding (AMBTC) method depending on Weber's law condition to distinguish uniform blocks (i.e., low and constant details blocks) from non-uniform blocks in original images. Then, all elements in the bitmap of each uniform block are represented by zero. After that, the lossless method, which is Run Length method, is used for compressing the bits more, which represent the bitmap of these uniform blocks. Via this simple idea, the result is improving

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Clinical And Experimental Dentistry
Preventive effect of combined Er, Cr: YSGG and fluoride gel on acid resistance of the permanent tooth enamel: An in vitro study
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sat Jan 12 2019
Journal Name
Journal Of The College Of Education For Women
STUDY THE CHARACATERISTIC OF SOILS TO DETERMINE SOME TYPES OF LANDS DEGRADATION FOR MAHMUDIYA DISTRICT
...Show More Authors

This study comprised three traverses extending parallel through the Northern, Central and Southern Mahmudiya districts, and perpendicular to the course of the Euphrates River. They were identified to collect (15) soil samples and some water samples as distributed within the land cover classes of the study area. Those classes were determined by visual interpretation and supervised classification for Landsat (TM) images obtained in August/2007. The digital classification was based on Maximum Likelihood method using six spectral bands excluding the thermal band. Chemical and physical laboratory analysis for the soil characteristics was performed to determine the types of land degradation in the study area.
The results showed that the hig

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Geological Journal
Wellbore Instability Analysis to Determine the Safe Mud Weight Window for Deep Well, Halfaya Oilfield
...Show More Authors

Wellbore instability is one of the most common issues encountered during drilling operations. This problem becomes enormous when drilling deep wells that are passing through many different formations. The purpose of this study is to evaluate wellbore failure criteria by constructing a one-dimensional mechanical earth model (1D-MEM) that will help to predict a safe mud-weight window for deep wells. An integrated log measurement has been used to compute MEM components for nine formations along the studied well. Repeated formation pressure and laboratory core testing are used to validate the calculated results. The prediction of mud weight along the nine studied formations shows that for Ahmadi, Nahr Umr, Shuaiba, and Zubair formations

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Sep 27 2020
Journal Name
Iraqi Geological Journal
ROCK JOINTS ANALYSIS TO DETERMINE THE MAIN STRESS FIELD IN BUSTANAH STRUCTURE NORTHEAST OF IRAQ
...Show More Authors

Joints are among the most widespread geologic structures as they are found in most each exposure of rock. They differ greatly in appearance, dimensions, and arrangement, besides they occur in quite different tectonic environments. This study is important because joints provide evidence on what kind of stress produced them (history of deformation) and also because they change the characteristics of the rocks in which they occur. The Measured data of joints from the studied area which are located in the high folded zone – Northeast of Iraq, were classified according to their relationship with the tectonic axes by projecting them stereographically using Schmidt net in GEOrient ver.9.5.0 software. The joint systems revealed the orientation of

... Show More
View Publication
Scopus (4)
Scopus
Publication Date
Wed Jul 26 2023
Journal Name
Journal Of Aridland Agriculture
Modern GPS diagnostic technique to determine and map soil hardpan for enhancing agricultural operation management
...Show More Authors

Among the undesirable effects of soil compaction is a measurable reduction in plant growth and crop yield. The prevailing belief is that compacted tillage pans are caused by repetitive farming practices, heavy tractors, tillage tools, and field traffic. This experiment was conducted to determine and map the hardpan layers across an agricultural field through advanced technologies of precision agriculture. These valuable techniques such as data logger, yield map, and data analysis of performance indicators were linked with accurate global positioning systems (GPS) datasets. These important technologies provided the farmers and helped them to identify and manage areas of the fields with higher compacted layers. Three ground speeds 4.3

... Show More
View Publication
Scopus (13)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref