Abstract :
The study aims at building a mathematical model for the aggregate production planning for Baghdad soft drinks company. The study is based on a set of aggregate planning strategies (Control of working hours, storage level control strategy) for the purpose of exploiting the resources and productive capacities available in an optimal manner and minimizing production costs by using (Matlab) program. The most important finding of the research is the importance of exploiting during the available time of production capacity. In the months when the demand is less than the production capacity available for investment. In the subsequent months when the demand exceeds the available energy and to minimize the use of overti
... Show MoreA new algorithm is proposed to compress speech signals using wavelet transform and linear predictive coding. Signal compression based on the concept of selecting a small number of approximation coefficients after they are compressed by the wavelet decomposition (Haar and db4) at a suitable chosen level and ignored details coefficients, and then approximation coefficients are windowed by a rectangular window and fed to the linear predictor. Levinson Durbin algorithm is used to compute LP coefficients, reflection coefficients and predictor error. The compress files contain LP coefficients and previous sample. These files are very small in size compared to the size of the original signals. Compression ratio is calculated from the size of th
... Show MoreModerately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreMotifs template is the input for many bioinformatics systems such codons finding, transcription, transaction, sequential pattern miner, and bioinformatics databases analysis. The size of motifs arranged from one base up to several Mega bases, therefore, the typing errors increase according to the size of motifs. In addition, when the structures motifs are submitted to bioinformatics systems, the specifications of motifs components are required, i.e. the simple motifs, gaps, and the lower bound and upper bound of each gap. The motifs can be of DNA, RNA, or Protein. In this research, a motif parser and visualization module is designed depending on a proposed a context free grammar, CFG, and colors human recognition system. GFC describes the m
... Show MoreSummary: The study focused on the role of the educational counselor in schools, as an integral part of the educational system that faces multiple challenges and difficulties. In this context, the counselor’s role becomes crucial in attempting to reduce or eliminate such difficulties, in addition to guiding students in an appropriate manner. Methodes: The study employed a descriptive field approach, using interviews and direct observation as tools to examine the actual role performed by school counselors. Results: The study concluded with several key findings, most notably the numerous challenges faced by counselors, including students’ negative behaviors, school dropouts, and the limited administrative support for counselors’ work. Fu
... Show MoreOften times, especially in practical applications, it is difficult to obtain data that is not tainted by a problem that may be related to the inconsistency of the variance of error or any other problem that impedes the use of the usual methods represented by the method of the ordinary least squares (OLS), To find the capabilities of the features of the multiple linear models, This is why many statisticians resort to the use of estimates by immune methods Especially with the presence of outliers, as well as the problem of error Variance instability, Two methods of horsepower were adopted, they are the robust weighted least square(RWLS)& the two-step robust weighted least square method(TSRWLS), and their performance was verifie
... Show MoreA novel series of liquid crystalline compounds containing 2,4-thiazolidinedione units with varying terminal alkyl chain lengths was successfully synthesized and characterized. The chemical structures of the synthesized compounds were confirmed by FT-IR, ¹H-NMR, and mass spectrometry. The mesomorphic behavior was investigated using polarized optical microscopy (POM) and differential scanning calorimetry (DSC). Compounds [V]₄, [V]₅, and [V]₆ exhibited enantiotropic nematic phases, while compound [V]₈ displayed a smectic A (SmA) phase. No liquid crystalline behavior was observed for compound [V]₃. The liquid crystalline properties were found to depend on the terminal-to-lateral chain length ratio, molecular geometry, and the nature
... Show More