Preferred Language
Articles
/
jeasiq-1758
Application of the Holonic Manufacturing System using the Genetic Algorithm : Case Study in Lab 7 of the General Company for the Leather Industry
...Show More Authors

The study aims to achieve several objectives, including follow-up scientific developments and transformations in the modern concepts of the Holistic Manufacturing System for the purpose of identifying the methods of switching to the entrances of artificial intelligence, and clarifying the mechanism of operation of the genetic algorithm under the Holonic Manufacturing System, to benefit from the advantages of systems and to achieve the maximum savings in time and cost of machines Using the Holistic Manufacturing System method and the Genetic algorithm, which allows for optimal maintenance time and minimizing the total cost, which in turn enables the workers of these machines to control the vacations in them, and based on the intellectual dilemma and to the problem of the field can be asked the question how to achieve the Holistic Manufacturing System using the genetic algorithm ?, and in light of which the importance of the study and its objectives were based on the analytical descriptive method in the theoretical framework. In the practical framework was based on the quantitative approach that used quantitative indicators of the separation line Comparing the results between the HOL method and the genetic algorithm method. After evaluating and testing the data, the data were analyzed using indicators. The results showed that the use of the genetic algorithm helped to reduce the effort, time and cost. It is possible to reach the optimal solution with very few steps when using the genetic algorithm as a random search algorithm. The main recommendations were the adoption of the laboratory management on the genetic algorithm. And the completion of the study with some proposals, the most prominent of which is to conduct further research on the Holistic Manufacturing System using the genetic algorithm and in various industrial and service sectors.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 20 2019
Journal Name
Proceedings Of The 2019 3rd International Conference On Big Data Research
Pressure Vessel Design Simulation Using Hybrid Harmony Search Algorithm
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Feb 25 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Block Matching Algorithm Using Mean and Low Order Moments
...Show More Authors

In this study, a fast block matching search algorithm based on blocks' descriptors and multilevel blocks filtering is introduced. The used descriptors are the mean and a set of centralized low order moments. Hierarchal filtering and MAE similarity measure were adopted to nominate the best similar blocks lay within the pool of neighbor blocks. As next step to blocks nomination the similarity of the mean and moments is used to classify the nominated blocks and put them in one of three sub-pools, each one represents certain nomination priority level (i.e., most, less & least level). The main reason of the introducing nomination and classification steps is a significant reduction in the number of matching instances of the pixels belong to the c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Anemia Blood Cell localization Using Modified K- Means Algorithm
...Show More Authors

View Publication
Publication Date
Wed Mar 23 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm
...Show More Authors

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.

Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Free Vibration Analysis of Laminated Composite Plates with General Boundary Elastic Supports Under Initial Thermal Load
...Show More Authors

Free vibration behavior was developed under the ratio of critical buckling temperature of laminated composite thin plates with the general elastic boundary condition. The equations of motion were found based on classical laminated plate theory (CLPT) while the solution functions consists of trigonometric function and a continuous function that is added to guarantee the sufficient smoother of the so-named remaining displacement function at the boundaries, in this research, a modified Fourier series were used, a generalized procedure solution was developed using Ritz method combined with the imaginary spring technique. The influences of many design parameters such as angles of layers, aspect ratio, thickness ratio, and ratio of initial in-

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the continuity of the demand for money and its impact on the Iraqi dinar exchange rate for the period 1991-2013 function
...Show More Authors

 Research Summary

It highlights the importance of assessing the demand for money function in Iraq through the understanding of the relationship between him and affecting the variables by searching the stability of this function and the extent of their influence in the Iraqi dinar exchange rate in order to know the amount of their contribution to the monetary policies of the Iraqi economy fee, as well as through study behavior of the demand for money function in Iraq and analyze the determinants of the demand for money for the period 1991-2013 and the impact of these determinants in the demand for money in Iraq.

And that the problem that we face is how to estimate the total demand for money in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Study the Effect of Residence Time Parameters on Thermal Cracking Extract Phase Lubricating Oil
...Show More Authors

This work studies with produce of light fuel fractions of gasoline, kerosene and gas oil from treatment of residual matter that will be obtained from the solvent extraction process as by product from refined lubricate to improve oil viscosity index in any petroleum refinery. The percentage of this byproduct is approximately 10% according to all feed (crude oil) in the petroleum refinery process. The objective of this research is to study the effect of the residence time parameter on the thermal cracking process of the byproduct feed at a constant temperature, (400 °C). The first step of this treatment is the thermal cracking of this byproduct material by a constructed batch reactor occupied with control device at a selective range of re

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 24 2025
Journal Name
Alrafidain Of Law
The Effects of the research and technology development contract -A comparative study-
...Show More Authors

Researching the effects of the research and technological development contract, determining its extent and demarcating the boundaries of the obligations imposed in it, is the cornerstone of economic growth and development, because defining these obligations removes the ambiguity and conflict between interests, by stating the rights owed to each party and even trying to reconcile them, or impose protection by specifying guarantees that are compatible with the essence of the R&D contract, For the purpose of studying the subject thoroughly, we will divide this research into two sections. The first is devoted to identifying the parties to the research and technological development contract. As for the other topic, we will explain the obligation

... Show More
View Publication