Preferred Language
Articles
/
jeasiq-170
Inventory control by using Fuzzy set theory An Applied Research at the Baghdad Soft Drinks Company
...Show More Authors

The production companies in the Iraqi industry environment facing many of the problems related to the management of inventory and control In particular in determining the quantities inventory that should be hold it. Because these companies  adoption on personal experience and some simple mathematical methods which lead to the identification of inappropriate quantities of inventory.

       This research aims to identify the economic quantity of production and purchase for the Pepsi can 330ml and essential components in Baghdad soft drinks Company in an environment dominated by cases of non ensure and High fluctuating as a result of fluctuating demand volumes and costs associated with inventory, and has been using the fuzzy time series method to dispose of uncertainty and fluctuation accompanying demand for finished product , and using the fuzzy inference system (If-Then Rules) to remove the cases of uncertainty associated with the holding inventory cost for the finished product and essential components.

      After removing the fuzzy of demand and holding inventory cost Parameters, been used the production model without Shortage to determine the economic production quantity for the Pepsi can 330 ml, and the purchase model without Shortage to determine the economic order quantity for the product components. The statistical programs (Matlab, Win Qsb.v2) were used for mathematical and statistical analyzes.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
Rough continuity and rough separation axioms in G<inf>m</inf>-closure approximation spaces
...Show More Authors

The theory of general topology view for continuous mappings is general version and is applied for topological graph theory. Separation axioms can be regard as tools for distinguishing objects in information systems. Rough theory is one of map the topology to uncertainty. The aim of this work is to presented graph, continuity, separation properties and rough set to put a new approaches for uncertainty. For the introduce of various levels of approximations, we introduce several levels of continuity and separation axioms on graphs in Gm-closure approximation spaces.

Preview PDF
Scopus Clarivate
Publication Date
Sun May 26 2019
Journal Name
Iraqi Journal Of Science
Exact and Local Search Methods for Solving Travelling Salesman Problem with Practical Application
...Show More Authors

This paper investigates some exact and local search methods to solve the traveling salesman problem. The Branch and Bound technique (BABT) is proposed, as an exact method, with two models. In addition, the classical Genetic Algorithm (GA) and Simulated Annealing (SA) are discussed and applied as local search methods. To improve the performance of GA we propose two kinds of improvements for GA; the first is called improved GA (IGA) and the second is Hybrid GA (HGA).

The IGA gives best results than GA and SA, while the HGA is the best local search method for all within a reasonable time for 5 ≤ n ≤ 2000, where n is the number of visited cities. An effective method of reducing the size of the TSP matrix was proposed with

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
...Show More Authors

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Fully Prime Semimodule, Fully Essential Semimodule and Semi-Complement Subsemimodules
...Show More Authors

      The concept of semi-essential semimodule has been studied by many researchers.

     In this paper, we will develop these results by setting appropriate conditions, and defining new properties, relating to our concept, for example (fully prime semimodule, fully essential semimodule and semi-complement subsemimodule) such that: if for each subsemimodule of -semimodule  is prime, then  is fully prime. If every semi-essential subsemimodule of -semimodule  is essential then  is fully essential. Finally, a prime subsemimodule  of  is called semi-relative intersection complement (briefly, semi-complement) of subsemimodule  in , if , and whenever  with  is a prime subsemimodule in , , then .  Furthermore, some res

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Detection and isolation of flavonoid and aromatic acid from Cynara scolymus different parts cultivated in iraq
...Show More Authors

The target of this study was to study the natural phytochemical components of the head (capsule) of Cynara scolymus cultivated in Iraq. The head (capsule) of plant was extracted by maceration in70% ethanol for 72 hours, and fractioned by hexane, chloroform and ethyl acetate. Preliminary qualitative phytochemical screening was performed on the ethyl acetate fraction for capsule was revealed the presence of flavonoid and aromatic acids. These were examined by (high -performance liquid chromatography) (HPLC diodarray), (high- performance thin-layer chromatography)(HPTLC).

Flavonoids were isolated by preparative layer chromatography and aromatic acid was isolated by preparative high-

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
AGENT BASED MONITORING FOR INVESTIGATION PROCESS AND MAINTENANCE IMPROVEMENT
...Show More Authors

Agent technology has a widespread usage in most of computerized systems. In this paper agent technology has been applied to monitor wear test for an aluminium silicon alloy which is used in automotive parts and gears of light loads. In addition to wear test monitoring، porosity effect on
wear resistance has been investigated. To get a controlled amount of porosity, the specimens have
been made by powder metallurgy process with various pressures (100, 200 and 600) MPa. The aim of
this investigation is a proactive step to avoid the failure occurrence by the porosity.
A dry wear tests have been achieved by subjecting three reciprocated loads (1000, 1500 and 2000)g
for three periods (10, 45 and 90)min. The weight difference a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Synthesis and Characterization of a Nano (CdO)0.94:(In2O3) 0.06 / Si gas Sensor
...Show More Authors

In this work, a (CdO)0.94:(In2O3)0.06 film was developed on a glass substrate using Q- switching pulse laser beam (Nd:YAG; wavelength 1064 nm). The quantitative elemental analysis of the (CdO)0.94:(In2O3)0.06 thin film was achieved using energy dispersive X- ray diffraction (EDX). The topological and morphological properties of the deposited thin film were investigated using atomic force microscope (AFM) and field emission scan electron microscopy (FESEM). The I-V characteristic and Hall effect of (CdO)0.94 :(In2O3)0.06 thin films were used  to  study the electrical properties. The gas sensor prope

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Mar 28 2020
Journal Name
Iraqi Journal Of Science
Duo Gamma Modules and Full Stability
...Show More Authors

In this work we study gamma modules which are implying full stability or implying by full stability. A gamma module is fully stable if for each gamma submodule of and each homomorphism of into . Many properties and characterizations of these classes of gamma modules are considered. We extend some results from the module to the gamma module theories.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
On y-closed Dual Rickart Modules
...Show More Authors

In this paper, we develop the work of Ghawi on close dual Rickart modules and discuss y-closed dual Rickart modules with some properties. Then, we prove that, if are y-closed simple -modues and if -y-closed is a dual Rickart module, then either Hom ( ) =0 or . Also, we study the direct sum of y-closed dual Rickart modules.

View Publication Preview PDF
Scopus (1)
Scopus Crossref