The study aims to achieve several objectives, including follow-up scientific developments and transformations in the modern concepts of the Holistic Manufacturing System for the purpose of identifying the methods of switching to the entrances of artificial intelligence, and clarifying the mechanism of operation of the genetic algorithm under the Holonic Manufacturing System, to benefit from the advantages of systems and to achieve the maximum savings in time and cost of machines Using the Holistic Manufacturing System method and the Genetic algorithm, which allows for optimal maintenance time and minimizing the total cost, which in turn enables the workers of these machines to control the vacations in them, and based on the intellectual dilemma and to the problem of the field can be asked the question how to achieve the Holistic Manufacturing System using the genetic algorithm ?, and in light of which the importance of the study and its objectives were based on the analytical descriptive method in the theoretical framework. In the practical framework was based on the quantitative approach that used quantitative indicators of the separation line Comparing the results between the HOL method and the genetic algorithm method. After evaluating and testing the data, the data were analyzed using indicators. The results showed that the use of the genetic algorithm helped to reduce the effort, time and cost. It is possible to reach the optimal solution with very few steps when using the genetic algorithm as a random search algorithm. The main recommendations were the adoption of the laboratory management on the genetic algorithm. And the completion of the study with some proposals, the most prominent of which is to conduct further research on the Holistic Manufacturing System using the genetic algorithm and in various industrial and service sectors.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show Moreهدف البحث إلى معرفة تقويم الكفاءة الادارية لأعضاء اللجان المشرفة على التطبيقات التدريسية في كليات التربية بجامعة بغداد من وجهة نظر التدريسيين المشرفين عليها. اعتمد البحث المنهج الوصفي التحليلي. وتكون مجتمع البحث من (162) مشرفاً على التطبيقات التدريسية من كليات التربية/ جامعة بغداد، واختيرت عينة البحث بالطريقة العشوائية البسيطة، وبلغ عدد أفراد العينة (120) مشرفاً من الكليات آنفة الذكر. وتم بناء استبانة تضمنت (35)
... Show Moreتهدف هذه الدراسة إلى معرفة الفرق في التحصيل الدراسي في الكيمياء والاتجاه نحو العلوم بين طلاب التخصص العلمي وطلاب التخصص الصناعي الصف الأول كلية التربية ابن الهيثم، كذلك تهدف الدراسة إلى معرفة العلاقة بين التحصيل الدراسي في الكيمياء ودرجات اختبار نهاية الفصل في الكيمياء، والمعدل التراكمي بعد أخذ المقرر الدراسي والاتجاه نحو العلوم بالنسبة لطلاب التخصص العلمي وطلاب التخصص الصناعي.
لقد است
... Show Moreيهدف البحث الحالي إلى دراسة تأثير المناخ التنظيمي لشعب الرياضة المدرسية في اقسام الانشطة الرياضية على مدرسي التربية الرياضية لأهمية المناخ التنظيمي لما يمثله من الخصائص والسلوكيات التي يتأثر بها العاملون التي قد تتباين من مكان لآخر والبيئة الجغرافية وثقافتها النوعية وذلك باستخدام المنهج الوصفي ولتتحقق من خلال الدراسة الميدانية, يتمثل مجتمع البحث الحالي من مدرسي التربية الرياضية في مدارس محافظة بغداد وال
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
In this paper, the generalized inverted exponential distribution is considered as one of the most important distributions in studying failure times. A shape and scale parameters of the distribution have been estimated after removing the fuzziness that characterizes its data because they are triangular fuzzy numbers. To convert the fuzzy data to crisp data the researcher has used the centroid method. Hence the studied distribution has two parameters which show a difficulty in separating and estimating them directly of the MLE method. The Newton-Raphson method has been used.
... Show More