Preferred Language
Articles
/
jeasiq-1400
اختبار أساليب تحديد حجم الدفعة المستخدمة في نظام MRP II* دراسة حالة في الشركة العامة لصناعة البطاريات معمل بابل /1
...Show More Authors

      MRP is a system intended for the batch manufacturing of discrete parts including assemblies and subassemblies that should be stocked to support future manufacturing needs.  Due to the useful information provided by MRP it has evolved into a Manufacturing Resources Planning, MRP II, a system that ties the basic MRP system to the other functional areas of the company such as marketing, finance, purchasing, etc.  The objective of this research, which was conducted at the State Company for Batteries Manufacturing, is to test the performance of some popular lot-sizing techniques used within MRP II framework. It is hypothesized that the technique which minimizes the total inventory costs does not necessarily minimize the need for resources such as machine capacity and labor force. To achieve this objective a computerized MRP II system was developed and simulated using random master production schedules of the 60A battery.  The results of the simulation runs confirmed the hypothesis.  This research recommends the use of the computerized MRP II system, developed here, in planning the manufacturing resources at the domain of research.

                                                  

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Reducing the Mutual Coupling of Cylindrical Circular Microstrip Antennas (CCMAs) Array Using EBG Structure
...Show More Authors

A theoretical study to design a conformal microstrip antennas was introduced in this work. Conformal microstrip antennas define antennas which can be conformed to a certain shape or to any curved surface. It is used in high-speed trains, aircraft, defense and navigation systems, landing gear and various communications systems, as well as in body wearable. Conformal antennas have some advantages such as a wider-angle coverage compared to flat antennas and low radar cross-sectional (RCS) and they are suitable for using in Radome. The main disadvantage of these antennas is the narrow bandwidth. The FDTD method is extremely useful in simulating complicated structures because it allows for direct integration of Maxwell's equations depending o

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Content Based Image Retrieval (CBIR) by Statistical Methods
...Show More Authors

            An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
ألوان - للطباعة والنشر والتوزيع
الاحصاء المالي - الطبعة الأولى
...Show More Authors

أن صفة التغير المتسارع في نمط الحياة ولّد مبدأ اللايقين عند إتخاذ القرارات المالية لأي ظاهرة عموماً أو نشاط إقتصادي على وجه الخصوص. وهذا يتطلب الأستعانة بالأدوات الأحصائية كمنهج علمي يساعد في وصفها وتحليلها كمياً ومن ثم التنبؤ بها مستقبلاً كمحاولة لسبر غور اللايقين الذي يكتنف المستقبل كمجهول يتوجس منه الجميع. وقد أصبح متخذ القرار الأستثماري أو صاحب رأس المال وغيرهما من المضاربين والمتعاملين في الاسواق الما

... Show More
Preview PDF
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
The Selected Prose "Dreams" by the Spanish Writer Quevedo: La Miscelánea de "Los Sueños" de Francisco de Quevedo
...Show More Authors

        Francisco de Quevedo is a well-known man of letters in the Golden Age of Spanish literature. He is the witness who related to us, in his works, the Spanish community  in that era. He showed in most of his writings the political weakness of Spain, and made prominent the remarkable literary aspect of Spain. He had a very good tlent for poetry, and a rather polite  style in exploiting colloquialisms in his literary writings. He wrote about philosophy, where his most prominent work was "The cradle and the grave". The writer was also very well-known for his puns which were employed to clarify his inner thoughts regarding  the Spanish  situation at that time.

Resume

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Photo Degradation of Solochrom Violet Dye by ZnO: Experimental and Theoretical Study
...Show More Authors

The present project involves photodegrading the dye solochrom violet under advanced oxidation techniques at (25 oC) temperature and UV light. Zinc Oxide (ZnO) and UV radiation at a wavelength of 580 nm were used to conduct the photocatalytic reaction of the solochrom violet dye. One of the factors looked into was the impact of the starting conditions. pH, the amount of original hydrogen peroxide, and the dye concentration time radiation were used. For hours, the kinetics and percentages of degradation were examined at various intervals. In general, it has been discovered that the photodegradation rates of the dye were greater when H2O2 and ZnO were combined with UV light. The best wavelength to use was determined. Modern oxidation techni

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
The Calculation and Analysis of the Total Electron Content Over Different Latitudes and Seasons Using the Numerical Trapezoidal and Simpson Methods
...Show More Authors

It has been shown in ionospheric research that calculation of the total electron content (TEC) is an important factor in global navigation system. In this study, TEC calculation was performed over Baghdad city, Iraq, using a combination of two numerical methods called composite Simpson and composite Trapezoidal methods. TEC was calculated using the line integral of the electron density derived from the International reference ionosphere IRI2012 and NeQuick2 models from 70 to 2000 km above the earth surface. The hour of the day and the day number of the year, R12, were chosen as inputs for the calculation techniques to take into account latitudinal, diurnal and seasonal variation of TEC. The results of latitudinal variation of TE

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Bi-Distance Approach to Determine the Topological Invariants of Silicon Carbide
...Show More Authors

          The use of silicon carbide is increasing significantly in the fields of research and technology. Topological indices enable data gathering on algebraic graphs and provide a mathematical framework for analyzing the chemical structural characteristics. In this paper, well-known degree-based topological indices are used to analyze the chemical structures of silicon carbides. To evaluate the features of various chemical or non-chemical networks, a variety of topological indices are defined. In this paper, a new concept related to the degree of the graph called "bi-distance" is introduced, which is used to calculate all the additive as well as multiplicative degree-based indices for the isomer of silicon carbide, Si2

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref