The main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowing and expecting the future running of the system to enhance the controllability of the system production and improve the production system and machine efficiency. Moreover, built an experiment-real model in Arena in order to control the system in term of production and process. First step is to collect the statistical data required for analysis in terms of input and output data for analysis. Second, is to track the production problem in term of process bottleneck in order to improve the utilization of the system. Third is to validate the model in order to overcome the product demand of the system uncontrollability. Through the result analysis of waiting time and production rate, it is clearly shown that system is stable with a need to resetting the capacity as a chance for the improvement, regarding to resources utilization. Re-planning resources capacity positively enhances the production and profitability of the system.
Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show MoreThe research aims to define the main and subsidiary criteria for evaluating the industrial market sectors and proposing a model for arranging these criteria according to priority and knowing the highest criteria in terms of relative importance in the General Company for Automobile Trade and Machinery, and for the purpose of establishing this model, experiences in the concerned company were approved, and this study proposes a multi-criteria decision model According to the FEAHP, the expanded fuzzy hierarchical analysis method enables the commercial company to develop clear strategic policies on which the company’s management system depends on determining criteria for evaluating and selecting market sectors and making appropriate
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreAbstract
This research aims to study and improve the passivating specifications of rubber resistant to vibration. In this paper, seven different rubber recipes were prepared based on mixtures of natural rubber(NR) as an essential part in addition to the synthetic rubber (IIR, BRcis, SBR, CR)with different rates. Mechanical tests such as tensile strength, hardness, friction, resistance to compression, fatigue and creep testing in addition to the rheological test were performed. Furthermore, scanning electron microscopy (SEM)test was used to examine the structure morphology of rubber. After studying and analyzing the results, we found that, recipe containing (BRcis) of 40% from th
... Show More This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type: , and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.
Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreIn this research, the influence of the fermentation treatments and baking in Iraqi’s flour type (Ibaa 99, Al-rashed, Tamus, Abu-grabe) and Turkish flour type (Muaamel) on phytic acid was investigated. In whole wheat flour, the phytic acid was (1500, 1290, 1450, 1230, 1440 ( mg/ 100 g flour respectively, and the inorganic phosphorous was (29.18, 25.15, 23.89, 20.85, 22.83) mg/100 g flour respectively. The dough prepared from flour with a higher phytic acid content also contained higher amount of phytic acid. During fermentation, degradation of phytic acid occurred. The cumulative loss of phytic acid after fermentation in all type of dough was ~ 23, 22, 34, 26 and 27% respectively،While increased of inorganic phosphorous occurred. The c
... Show More