Preferred Language
Articles
/
bsj-5924
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers schedule efficient ways to deliver product orders to recipients. Based on testing, the Dijkstra algorithm that has been included in the nearest route search function for the delivery process has worked well. This system is expected to improve the efficient management and delivery of orders.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Simulation As One Of The Tools Of Visual Thinking And Its Effect On Developing Drawing And Design Skills To Produce Innovative Artworks: عائشة عبد الجبار العيسى
...Show More Authors

The research emphasizes importance of preliminary drawings in design of any product. Therefore, using of simulation as tools for visual thinking in developing drawing and design skills. So that practice of drawing by hand, considering shape of ideas in first stage of visualizations, and practice of its techniques and continuous training.
Hence, the research problem arose with the role of simulation method for developing preliminary sketches in the sample of students of the Product Design Department at the College of Design and Art, PNU, as it is important tool for visual thinking that helps the designer in designing and producing innovative artistic works.
Therefore, the research axes, a number of findings and recommendations were

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 06 2022
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Instructional program on patients with ulcerative colitis adherence for Medication and Diet to prevent Colorectal Cancer: case and control study
...Show More Authors

ABSTRACT:

Objectives: The study aims to know the effectiveness of the educational program in the patient’s adherence to medication and diet and to know the relationship between the effectiveness of the education program and their demographic data related to the patient’s age, gender, marital status, education level, occupation, monthly income and residence.

Methodology: A quasi -experimental design study was performed on patient who attended to Gastroenterology and Hepatology Teaching Hospital, from March 2021 to September 2021. The non-probability sampling including 50 patients for case study and 30 patients for control group. The questionnaire consists of 3 parts, part one the socio

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Examining the Asymmetric Impacts of Interest and Exchange Rate on Investment in Egypt for the Period 1976-2020: Applying NARDL Model
...Show More Authors

Most of the studies conducted in the past decades focused on the effect of interest rates and exchange rates on domestic investment under the assumption that the independent variables have the same effect on the dependent variable, but there were limited studies that investigated the unequal effects of changes in interest rates and exchange rates, both positive and negative, on domestic investment.  This study used a nonlinear autoregressive distributed lag (NARDL) model to assess the unequal effects of the real interest rate and real exchange rate variables on domestic investment in Egypt for the period 1976 - 2020.  The results revealed that positive and negative shocks for both exchange rates have unequal effects on

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of insider trading in accounting information on the investors decisions: An Applied Study In a sample of corporation listed in Iraq Securities Exchange
...Show More Authors

This research aims to discuss an important issue because of its role in increasing the efficiency of financial markets and boost investor confidence by a insider trading, which arises as a result of leaking secret information to some investors and reliable in the process of trading shares in the Iraq Stock Exchange And thus obtain abnormal profits at the expense of other investors. Research was based on the assumption that " Where shortcomings in local regulations relating to disclosure and insider trading in accounting information leads to the activate the phenomenon of insider trading in accounting information in the Iraq Stock Exchange and including a negative impact on investors' decisions ". and Because of the difficulty the discove

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 02 2024
Journal Name
Farmacia
SOLUPLUS AND SOLUTOL HS-15 OLMESARTAN MEDOXOMIL NANOMICELLE BASED ORAL FAST DISSOLVING FILM: IN VITRO AND IN VIVO CHARACTERIZATION
...Show More Authors

Olmesartan medoxomil (OM) has low bioavailability and limited solubility. To enhance bioavailability, fast dissolving films (FDF) with mixed micelles of soluplus (SPL) and solutol HS15 (STL H15) were developed using solvent casting. The optimised formula, FM2, used polyvinyl alcohol (PVA) and showed high entrapment efficiency, rapid disintegration, and significant improvement in OM bioavailability compared to the market tablet (Olmetec®). FM2 also demonstrated stability and potential for enhanced drug delivery.

Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Sensing Performance of Modified Single Mode Optical Fiber Coated With Nanomaterials-Based Ammonia Sensors Operated in the C-Band
...Show More Authors

View Publication
Scopus (16)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Nanomedicine: Nanotechnology, Biology And Medicine
Listeria innocua Dps as a nanoplatform for bioluminescence based photodynamic therapy utilizing Gaussia princeps luciferase and zinc protoporphyrin IX
...Show More Authors

View Publication Preview PDF
Scopus (22)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Tue Sep 02 2025
Journal Name
Chemistry & Biodiversity
Synthesis, In Silico, and Biological Evaluation of Non‐Hydroxamate Benzoic Acid–Based Derivatives as Potential Histone Deacetylase Inhibitors (HDACi)
...Show More Authors
ABSTRACT<p>Unregulated epigenetic modifications, including histone acetylation/deacetylation mediated by histone acetyltransferases (HATs) and histone deacetylases (HDACs), contribute to cancer progression. HDACs, often overexpressed in cancer, downregulate tumor suppressor genes, making them crucial targets for treatment. This work aimed to develop non‐hydroxamate benzoic acid–based HDAC inhibitors (HDACi) with comparable effect to the currently four FDA‐approved HDACi, which are known for their poor solubility, poor distribution, and significant side effects. All compounds were structurally verified using FTIR, <sup>1</sup>HNMR, <sup>13</sup>CNMR, and mass spectrometry. In silico ana</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref