Preferred Language
Articles
/
jeasiq-2071
Evaluation suppliers according to the integration of the Quality Function Deployment and the Fuzzy Analytic Hierarchy Process
...Show More Authors

The process of evaluating business processes, complex, repetition of procurement processes, need for raw materials and frequency of demand, which makes dealing with suppliers in the evaluation process, making the need for a process intervention in the process. Lighter on the other hand.

Many Iraqi companies suffer from problems related to suppliers, and cases of administrative and financial corruption are often raised regarding this type of contract and from this reality the necessity of researching this problem and trying to develop some solutions to reduce its impact on the companies' work, by using a method that works according to the standards adopted in Evaluation and selection of the supplier in the company.

Based on the foregoing, this research came to provide decision-makers with a computerized scientific tool that reduces the effort, time and money that they cause as a result of poor selection and what may follow in terms of delay in production, defects in the product and loss of the company's reputation, and this research aims to provide a vision regarding the latest standards followed in choosing the best supplier Demonstrate how to apply the integration model between the Quality function deployment and fuzzy analytic hierarchy process (FAHP - QFD) with the application of Microsoft Excel.

This research was applied in the "Arab Company for Antibiotics Industries (ACAI)", and the sample of the research was represented in two groups of the suppliers: the first is specialized in primary and second is specialized in materials, as well as in packaging materials. The research used a scientific method - a “case study” - to apply the research in this company. The data was collected by relying on a special examination list of a two-way comparison as well as using the QFD method to choose how important the criteria are, as well as the use of the FAHP process to determine the importance of the (weights) in QFD. As for the use of the misty principle, it can more accurately reflect the requirements of the company and provide a decision tool that would facilitate the selection of the supplier, and then the integration is applied between the tool of Quality function deployment (QFD) and fuzzy analytic hierarchy process (FAHP) to evaluate and select the best supplier.

The researcher also suggested several recommendations including the necessity of adopting a multi-criteria scientific method in the process of selecting the supplier. The research also recommends establishing long-term relationships with the chosen suppliers and the company should promote and advertise its products in the private sector

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Deep Vein Thrombosis Predisposing Factors Analysis Using Association Rules Mining
...Show More Authors

Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Al-dhad Book Store And Publishing
Calculus part 1
...Show More Authors

This book includes three main chapters: 1. Functions & Their Derivatives. 2. Minimum, Maximum and Inflection points. 3. Partial Derivative. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Elderly Healthcare System for Chronic Ailments using Machine Learning Techniques – a Review
...Show More Authors

     World statistics declare that aging has direct correlations with more and more health problems with comorbid conditions. As healthcare communities evolve with a massive amount of data at a faster pace, it is essential to predict, assist, and prevent diseases at the right time, especially for elders. Similarly, many researchers have discussed that elders suffer extensively due to chronic health conditions.  This work was performed to review literature studies on prediction systems for various chronic illnesses of elderly people. Most of the reviewed papers proposed machine learning prediction models combined with, or without, other related intelligence techniques for chronic disease detection of elderly patie

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (9)
Scopus Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 29 2019
Journal Name
Iraqi Journal Of Science
On Lie Structure in Semiprime Inverse Semirings
...Show More Authors

In this paper we introduce the definition of  Lie ideal on inverse semiring and we generalize some results of Herstein about Lie structure of an associative rings to inverse semirings.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 26 2020
Journal Name
Journal Of Global Pharma Technology
Synthesis, Characterization of 2-azido-4-(azido (2-azido-2-( azido carbonyl)-1,3-dioxoian-4-yl)methyl)– 5-((R-azido (hydroxyl) methyl- 1,3-dioxole-2-carbonyl azide. ethanol. hydrate (L-AZD) with Some Metal Complexes
...Show More Authors

The reaction oisolated and characterized by elemental analysis (C,H,N) , 1H-NMR, mass spectra and Fourier transform (Ft-IR). The reaction of the (L-AZD) with: [VO(II), Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II)], has been investigated and was isolated as tri nuclear cluster and characterized by: Ft-IR, U. v- Visible, electrical conductivity, magnetic susceptibilities at 25 Co, atomic absorption and molar ratio. Spectroscopic evidence showed that the binding of metal ions were through azide and carbonyl moieties resulting in a six- coordinating metal ions in [Cr (III), Mn (II), Co (II) and Ni (II)]. The Vo (II), Cu (II), Zn (II), Cd (II) and Hg (II) were coordinated through azide group only forming square pyramidal

... Show More
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Content Based Image Retrieval (CBIR) by Statistical Methods
...Show More Authors

            An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Agricultural And Statistical Sciences
A COMPARISON BETWEEN SOME HIERARCHICAL CLUSTERING TECHNIQUES
...Show More Authors

In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.

Preview PDF
Scopus (1)
Scopus
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Network Performance Analysis Based on Network Simulator NS-2.
...Show More Authors

     NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.

View Publication Preview PDF
Crossref