Preferred Language
Articles
/
jeasiq-2135
Designing a Quality System using the Goals Programming Method -An Applied Research
...Show More Authors

Due to the continuous development in society and the multiplicity of customers' desires and their keeping pace with this development and their search for the quality and durability of the commodity that provides them with the best performance and that meets their needs and desires, all this has led to the consideration of quality as one of the competitive advantages that many industrial companies compete for and which are of interest to customers and are looking for. The research problem showed that the Diyala State Company for Electrical Industries relies on some simple methods and personal experience to monitor the quality of products and does not adopt scientific methods and modern programs. The aim of this research is to design a system to monitor the production quality of the transformer (400/11 KVA) through the use of a method that helps to make decisions of a quantitative multi-objective nature, which is the method of lexicographic goal programming that the researcher used to integrate the preferences of the decision-maker in monitoring the quality of the production of the transformer (400/11 KVA). Using the two programs (Excel and Lingo) in constructing and solving the mathematical model that was applied in the sections (outer and inner iron core, winding and isolating, final assembly and quality control). The results obtained were efficient, as they achieved the least possible deviations from all the target values ​​for all goals

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 04 2017
Journal Name
International Journal Of Environmental Science And Technology
A review of permeable reactive barrier as passive sustainable technology for groundwater remediation
...Show More Authors

Scopus (132)
Crossref (118)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Preparation and Characterization of (Hyacinth plant / Chitosan) Composite as a Heavy Metal Removal
...Show More Authors

In this study, the preparation and characterization of hyacinth plant /chitosan composite, as a heavy metal removal, were done. Water hyacinth plant (Eichhorniacrasspes) was collected from Tigris river in Baghdad. The root and shoot parts of plant were ground to powder. Composite materials were prepared at different ratios of plant part (from 2.9% to 30.3%, wt /wt) which corresponds to (30-500mg) of hyacinth plant (root and shoot) and chitosan. The results showed that all examined ratios of plant parts have an excellent absorption to copper (Cu (II)). Moreover, it was observed that 2.9% corresponds (30mg) of plant root revealed highest removal (82.7%) of Pb (II), while 20.23% of shoot removed 61% of Cd (II) within 24 hr

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Dynamic Response of a Nonlinear Fabry-Perot Etalon for Various Medium Response Times
...Show More Authors

     In this work, the switching nonlinear dynamics of a Fabry-Perot etalon are studied. The method used to complete the solution of the differential equations for the nonlinear medium. The Debye relaxation equations solved numerically to predict the behavior of the cavity for modulated input power. The response of the cavity filled with materials of different response time is depicted. For a material with a response time equal to = 50 ns, the cavity switches after about (100 ns). Notice that there is always a finite time delay before the cavity switches. The switch up time is much longer than the cavity build-up time of the corresponding linear cavity which was found to be of the order of a few round-trip ti

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Apr 01 2014
Journal Name
International Communications In Heat And Mass Transfer
Determination of a time-dependent thermal diffusivity and free boundary in heat conduction
...Show More Authors

View Publication
Scopus (18)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Pakistan Heart Journal
Workplace Violence and Nursing Job Performance at Pediatric Emergency Departments: A Comparative Study
...Show More Authors

Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Co – odd (even) Sum Degree Edge Domination Number in Graphs
...Show More Authors

 An edge dominating set    of a graph  is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number  is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G.  The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
A Comparison of Different Estimation Methods to Handle Missing Data in Explanatory Variables
...Show More Authors

Missing data is one of the problems that may occur in regression models. This problem is usually handled by deletion mechanism available in statistical software. This method reduces statistical inference values because deletion affects sample size. In this paper, Expectation Maximization algorithm (EM), Multicycle-Expectation-Conditional Maximization algorithm (MC-ECM), Expectation-Conditional Maximization Either (ECME), and Recurrent Neural Networks (RNN) are used to estimate multiple regression models when explanatory variables have some missing values. Experimental dataset were generated using Visual Basic programming language with missing values of explanatory variables according to a missing mechanism at random general pattern and s

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Dec 14 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Diabetes Self-Management among Patients in Baghdad City: A Comparative Study
...Show More Authors

Objective(s): To Evaluate Diabetes self –management among patients in Baghdad City and to compare
between these patients self-management relative to the type of the disease.
Methodology: A descriptive design was conducted in Baghdad city, started from November 16th 2017 to the
end of May 17 th 2018 in order to evaluate Diabetes self-management. Purposive (non-probability) sample,
which was consisted of (120) patients who were diagnosed with D.M. The sample is comprised of (60) patient
with diabetes type I and (60) patient with diabetes type II. It is consisted of (60) male and (60) female. A
questionnaire is constructed for the purpose of the study. It is composed of (42) items. Reliability and validity of
the ques

... Show More
View Publication Preview PDF