Due to the continuous development in society and the multiplicity of customers' desires and their keeping pace with this development and their search for the quality and durability of the commodity that provides them with the best performance and that meets their needs and desires, all this has led to the consideration of quality as one of the competitive advantages that many industrial companies compete for and which are of interest to customers and are looking for. The research problem showed that the Diyala State Company for Electrical Industries relies on some simple methods and personal experience to monitor the quality of products and does not adopt scientific methods and modern programs. The aim of this research is to design a system to monitor the production quality of the transformer (400/11 KVA) through the use of a method that helps to make decisions of a quantitative multi-objective nature, which is the method of lexicographic goal programming that the researcher used to integrate the preferences of the decision-maker in monitoring the quality of the production of the transformer (400/11 KVA). Using the two programs (Excel and Lingo) in constructing and solving the mathematical model that was applied in the sections (outer and inner iron core, winding and isolating, final assembly and quality control). The results obtained were efficient, as they achieved the least possible deviations from all the target values for all goals
The traditional voice call over Global System for Mobile Communications (GSM) and Public Switched Telephone Network (PSTN) is expensive and does not provide a secure end to end voice transmission. However, the growth in telecommunication industry has offered a new way to transmit voice over public network such as internet in a cheap and more flexible way. Due to insecure nature of the public network, the voice call becomes vulnerable to attacks such as eavesdropping and call hijacking. Accordingly, protection of voice call from illegal listening becomes increasingly important.
To this end, an android-based application (named E2ESeVoice application) to transmit voice in a secure way between the end users is proposed based on modified R
In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant
... Show MoreBackground: Malnutrition is an adverse prognostic factor in the outcome of children with standard risk acute lymphoblastic leukemia due to a significantly higher rate of bone marrow relapse in the malnourished patients. The event free survival of children with acute lymphoblastic leukemia in developed countries has increased substantially in the last two decades as treatment with intensive protocols has brought the estimated probability of event free survival at 5 years close to 75%. Although the prognosis of acute lymphoblastic leukemia has also been improved in underdeveloped countries, the figures for event free survival are lower, even when aggressive protocols are used. Unfavorable socioeconomic fa
... Show MoreThe Iraqi people were subjected to the most brutal crime in the history of humanity when ISIS violated the rights system and targeted women, children, civilians, minorities, religion, belief and the right to education and committed many crimes of genocide and crimes against humanity and the abandonment of millions of citizens and the recruitment of thousands of children, which constituted a flagrant violation of human rights and international law It emphasizes the gravity of the threat to international peace and security by the organization and its associated individuals, groups, institutions and entities, including foreign terrorist fighters.
That the legal characterization
... Show MoreMaximum likelihood estimation method, uniformly minimum variance unbiased estimation method and minimum mean square error estimation, as classical estimation procedures, are frequently used for parameter estimation in statistics, which assuming the parameter is constant , while Bayes method assuming the parameter is random variable and hence the Bayes estimator is an estimator which minimize the Bayes risk for each value the random observable and for square error lose function the Bayes estimator is the posterior mean. It is well known that the Bayesian estimation is hardly used as a parameter estimation technique due to some difficulties to finding a prior distribution.
The interest of this paper is that
... Show MoreThe developments in forensic DNA technology have led us to perform this study in Iraqi population as reference database of autosomal Short Tandem Repeat (aSTR) DNA markers . A total of 120 unrelated individuals from Wasit province were analyzed at 15 STR DNA markers. Allele frequencies of DNA typing loci included in the AmpFlSTR1 IdentifilerTM PCR Amplification Kit panel from Applied Biosystems (D3S1358, vWA, FGA, D8S1179, D21S11, D18S51, D5S818, D13S317, D7S820, TH01, TPOX, CSF1PO, D19S433, D2S1338, D16S539) and several forensic efficiency statistical parameters were estimated from all the sample. the combined Matching Probability (CMP) using the 15 STR genetic loci in Iraqi population was estimated at 1 in 2.08286E-18 and the Combined
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show More