Preferred Language
Articles
/
jeasiq-170
Inventory control by using Fuzzy set theory An Applied Research at the Baghdad Soft Drinks Company
...Show More Authors

The production companies in the Iraqi industry environment facing many of the problems related to the management of inventory and control In particular in determining the quantities inventory that should be hold it. Because these companies  adoption on personal experience and some simple mathematical methods which lead to the identification of inappropriate quantities of inventory.

       This research aims to identify the economic quantity of production and purchase for the Pepsi can 330ml and essential components in Baghdad soft drinks Company in an environment dominated by cases of non ensure and High fluctuating as a result of fluctuating demand volumes and costs associated with inventory, and has been using the fuzzy time series method to dispose of uncertainty and fluctuation accompanying demand for finished product , and using the fuzzy inference system (If-Then Rules) to remove the cases of uncertainty associated with the holding inventory cost for the finished product and essential components.

      After removing the fuzzy of demand and holding inventory cost Parameters, been used the production model without Shortage to determine the economic production quantity for the Pepsi can 330 ml, and the purchase model without Shortage to determine the economic order quantity for the product components. The statistical programs (Matlab, Win Qsb.v2) were used for mathematical and statistical analyzes.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 13 2025
Journal Name
Al Ghary Journal Of Economic And Administrative Sciences
The impact of strategic knowledge on strategic improvisation: an exploratory study of some private hospitals in the city of Baghdad
...Show More Authors

View Publication
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The typical path of compliance control in the verification of tax revenues
...Show More Authors

The research aims to contribute to the consolidation of scientific knowledge of compliance control and its role in verifying the proper disposal of funds to manage the wheel of the economy towards achieving targeted development and preserving public money, as well as clarifying the role of tax revenues in strengthening the public treasury and achieving social justice. The analytical descriptive approach was adopted in the process of analyzing The quantitative data collected through personal interviews, and the research reached a set of conclusions, the most important of which is the contribution of compliance control according to its three principles. (Transparency, accountability, and inclusiveness) on the availability

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 16 2019
Journal Name
Al–bahith Al–a'alami
press Coverage Of Youth Social Problems An analytical Study of Al- Sabah Newspaper
...Show More Authors

The tremendous political transformations that took place in Iraq after 2003 led by the USA and its allies led to a change of its political system under the slogan of liberating Iraq from dictatorship, establishing a democratic system and spreading freedom among members of the society.
However, democracy was a mantle under which the US intended to achieve its expansionist ambitions in the region. It did not come to liberate Iraq as it claimed, but it occupied Iraq and all its materialistic and human resources. Thus, this change resulted in lots of negative events and societal pests that affected the entire social system and values. Youth is an important segment; it is one of the most affected age groups with the happenings and accident

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Image Compression based on Adaptive Polynomial Coding of Hard & Soft Thresholding
...Show More Authors

In this paper, an adaptive polynomial compression technique is introduced of hard and soft thresholding of transformed residual image that efficiently exploited both the spatial and frequency domains, where the technique starts by applying the polynomial coding in the spatial domain and then followed by the frequency domain of discrete wavelet transform (DWT) that utilized to decompose the residual image of hard and soft thresholding base. The results showed the improvement of adaptive techniques compared to the traditional polynomial coding technique.

View Publication Preview PDF
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Comparison the effectiveness of using a magnetic field to control theColi phages isolated from rivulet water with water-treatment using magnetic field added iron filings
...Show More Authors

The present study aimed to use the magnetic field and nanotechnology in the field of water purification, which slots offering high efficiency to the possibility of removing biological contaminants such as viruses and bacteria rather than the use of chemical and physical transactions such as chlorine and bromine, and ultraviolet light and boiling and sedimentation and distillation, ozone and others that have a direct negative impact on human safety and the environment. Where they were investigating the presence in water samples under study Coli phages using Single agar layer method and then treated samples positive for phages to three types of magnetic field fixed as follows (North Pole - South Pole - Bipolar) and compare the re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The use of technology review and evaluate programs PERT to improve the cost method on the basis of activity: بحث تطبيقي في الشركة العامة للصناعات النسيجية /واسط
...Show More Authors

Suffer most of the industrial sector companies from high Kperfi magnitude of the costs of industrial indirect, lack of equitable distribution of these costs on the objectives of cost, increased competition, and the lack of proper planning in line and changes faced by the industrial sector (general) and sample (private), as well as the difficulty in re- directing efforts to improve profitability and in-depth analysis of activities, and to identify untapped resource activities, then link these activities to the final products  The research aims to apply the technology review and evaluate programs with the method (ABC) through the application stages of planning, scheduling and control and a comparison to get to the products of dev

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 27 2020
Journal Name
Journal Of The College Of Education For Women
The Effect of Using Online Automated Feedback on Iraqi EFL Learners’ Writings at University Level
...Show More Authors

Feedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Mar 27 2019
Journal Name
Iraqi Journal Of Science
Evaluation of the Tectonic Boundaries Using Potential Data at Tikrit-Kirkuk Area, North - Central Iraq
...Show More Authors

The gravity and magnetic data of Tikrit-Kirkuk area in central Iraq were considered to study the tectonic situation in the area. The residual anomalies were separated from regional using space windows method with space of about 24, 12 and 10km to delineate the source level of the residual anomalies. The Total Horizontal Derivative (THD) is used to identify the fault trends in the basement and sedimentary rocks depending upon gravity and magnetic data. The identified faults in the study area show (NW-SE), less common (NE-SW) and rare (N-S) trends. Some of these faults extending from the basement to the upper most layer of the sedimentary rocks. It was found that the depth of some gravity and magnetic source range 12-13Km, which confirm th

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
A Comparative Study between Computer Textbooks Content in the Secondary Stage and Computer Textbooks Content in the University Stage in Colleges of Education at Baghdad University
...Show More Authors

Record, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).

View Publication Preview PDF