Preferred Language
Articles
/
jeasiq-715
Operations Rescheduling Strategies, Policies, and Methods: A Philosophic Approach
...Show More Authors

When scheduling rules become incapable to tackle the presence of a variety of unexpected disruptions frequently occurred in manufacturing systems,  it is necessary to develop a reactive schedule which can absorb the effects of such disruptions. Such responding requires efficient strategies, policies, and methods to controlling production & maintaining high shop performance. This can be achieved through rescheduling task which defined as an essential operating function to efficiently tackle and response to uncertainties and unexpected events. The framework proposed in this study consists of rescheduling approaches, strategies, policies, and techniques, which represents a guideline for most manufacturing companies operating in such dynamic changing environments, facing a wide variety of unexpected events and disruptions.

Rescheduling strategies are dynamic scheduling & predictive\reactive scheduling. In practice, rescheduling done either periodically or occasionally, and in some cases it done in a hybrid manner as policies to plan activities for next time periods and at the same time to response to significant disruption. Some rescheduling methods used to create robust schedules by regenerating or updating schedules. These methods are: Time Shift Rescheduling, Partial Rescheduling, and Total Rescheduling.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Using a novel approach to determine the pore pressure of West Qurna 15 oil well in South of Iraq
...Show More Authors

Pore pressure means the pressure of the fluid filling the pore space of formations. When pore pressure is higher than hydrostatic pressure, it is named abnormal pore pressure or overpressure. When abnormal pressure occurred leads to many severe problems such as well kick, blowout during the drilling, then, prediction of this pressure is crucially essential to reduce cost and to avoid drilling problems that happened during drilling when this pressure occurred. The purpose of this paper is the determination of pore pressure in all layers, including the three formations (Yamama, Suliay, and Gotnia) in a deep exploration oil well in West Qurna field specifically well no. WQ-15 in the south of Iraq. In this study, a new appro

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The eloquence of the poetic image in the poetry of the Andalusian son of Labanism is a stylistic approach
...Show More Authors

The resort to the eloquence of the poetic image as a style reveals the poet's creativity and creativity in dealing with external influences, and reflect them with emotional images express a sense of intense emotional imagination, and this imagination stems from the experience of a poetic sense of truth, tasted by the recipient before the creator of the poetic text.

View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
The Approach of Discretion in Contemporary Jurisprudential Issues, with Imam Al-Qaradawi The Jurisprudence of Minorities as a Model
...Show More Authors

Research Objectives: The research aims to highlight the approach of Imam Al-Qaradawi in contemporary jurisprudence in the recent issues of the jurisprudence of minorities, and mentioning the foundations of jurisprudence of minorities, along with some of the practical applications of Imam Al-Qaradawi.

Study Methodology: The researcher applied the inductive, analytical and comparative approach by tracking the scientific material related to the subject of the study from the books of Al-Qaradawi in the first place, then by comparing the legal provisions with what had been stated in the four schools of jurisprudence.

Findings: The interest and need of Muslim minorities in non-

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 13 2019
Journal Name
Spe Kuwait Oil & Gas Show And Conference
Optimization of Fracture Parameters for Hydraulic Fractured Horizontal Well in a Heterogeneous Tight Reservoir: An Equivalent Homogeneous Modelling Approach
...Show More Authors
Abstract<p>Building numerical reservoir simulation model with a view to model actual case requires enormous amount of data and information. Such modeling and simulation processes normally require lengthy time and different sets of field data and experimental tests that are usually very expensive. In addition, the availability, quality and accessibility of all necessary data are very limited, especially for the green field. The degree of complexities of such modelling increases significantly especially in the case of heterogeneous nature typically inherited in unconventional reservoirs. In this perspective, this study focuses on exploring the possibility of simplifying the numerical simulation pr</p> ... Show More
View Publication
Scopus (24)
Crossref (15)
Scopus Crossref
Publication Date
Mon Sep 07 2020
Journal Name
Environmental Science And Pollution Research
The biosorption of reactive red dye onto orange peel waste: a study on the isotherm and kinetic processes and sensitivity analysis using the artificial neural network approach
...Show More Authors

View Publication
Scopus (35)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The impact of the Roundtable and Self-Questioning strategies on achievement and self-efficacy For students of the Faculty of Education in the subject of research curricula
...Show More Authors

The current research aims to identify "the impact of the round table strategies and the question of self-achievement and self-efficacy among students of the Faculty of Education in research methodology course.” The research sample consisted of (75) male and female-third stage students in the department of Life Sciences / College of Education for Pure Sciences / University of Dhi Qar for the academic year (2018-2019. The researcher adopted the experimental approach to achieving the study objectives. The researcher prepared two tools: the achievement test and the self-efficacy scale were applied to the collected sample to obtain the needed data. The result showed that there was a statistically significant difference at the level (0.05) b

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating Quality of Control Policies and Procedures for Banking Transactions Using the Non-application Gap Model to Enhance Financial Reporting Requirements Applied Study in an Iraqi Private Bank
...Show More Authors

The research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatementsThe researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is

... Show More
View Publication Preview PDF
Crossref (2)
Crossref