Preferred Language
Articles
/
joe-509
Determination Optimum Inventory Level for Material Using Genetic Algorithm
...Show More Authors

The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period.                                                    This study was applied in Wasit Company for Textile Manufacturing in the Textile Factory, where it produces five products, which are printed striped, plain, poplin, dyed poplin and Naba weave.  The products are made from cotton and they are passing through several stages to transfer to the final product. A genetic algorithm is used to determine the optimum quantity of the purchase a cotton and colors for each month and with minimum cost. Where the purchasing and transportation costs were either constant or variable with respect to purchased quantities while holding cost is kept constant. The results showed that the total cost of the first model is minimum than the second model because the holding cost for this model is less from the second model, while the purchasing and transportation costs from two models are equals. The percentage of purchasing cost for cotton is the biggest value, more 99% of purchasing cost for two models.

                        

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Sprite Region Allocation Using Fast Static Sprite Area Detection Algorithm
...Show More Authors

Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (17)
Crossref (3)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Human Pose Estimation Algorithm Using Optimized Symmetric Spatial Transformation Network
...Show More Authors

Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Nov 30 2019
Journal Name
Journal Of Engineering And Applied Sciences
Using Particle Swarm Optimization Algorithm to Address the Multicollinearity Problem
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Ain Shams Engineering Journal
Performance enhancement of high degree Charlier polynomials using multithreaded algorithm
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Text-based Steganography using Huffman Compression and AES Encryption Algorithm
...Show More Authors

In every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs  provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Biodiversity and Genetic Relationships to the Species for the genus Gladiolus L. (Iridaceae) Wild Growing in Iraq Using RAPD-PCR Technique
...Show More Authors

This study observed the genetic diversity and relationships among 4 species belonging to genus Gladiolus L. , by using the Random  Amplified Polymorphic DNA (RAPD) technique , the study  includes extraction of genomic DNA from the dray leaves by using commercial kit . 4 random primers  used the produced of many polymorphic bands among the 4 species , it was also possible to fined the DNA fingerprint of all studied species.Through the appearance of a number of bands that were unique to each species.Genetic distances ranged from 0.10 to 0.86, and used cluster  analysis were performed to construct dendrogram.Cluster analysis grouped the 4 species Into tow main clusters depending on their ancestor and their morphological

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Data Aggregation in Wireless Sensor Networks Using Modified Voronoi Fuzzy Clustering Algorithm
...Show More Authors

Data centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Genetic variation between wild type and auxotrophic mutant isolates of Sinorhizobium meliloti by using RAPDPCR technique
...Show More Authors

SGI2 wild type isolate of Sinorhizobium meliloti was isolated from Medicago sativa (alfalfa) plant which was obtained from Al-Tarmiaa region / Baghdad. Nine auxotrophic mutants were obtained from the SGI2 wild type isolate by mutagenesis with Nitrous acid (HNO2). The SGI2 wild type and the all auxotrophic mutant isolates had two Megaplasmids; pSymA and pSymB. No genetic variations in plasmid number and size were detected when gel electrophoresis was done for plasmid profile detection. Genetic variations by using RAPD-PCR technique were obtained between wild type and auxotrophic mutant isolates. One band was detected in SGI6 gel profile with 1.5 Kb size when OPY-04 primer was used. Using OPB7 primer by using RAPD-PCR technique showed larg

... Show More
View Publication Preview PDF