The objective of this work is to study the influence of end milling cutting process parameters, tool material and geometry on multi-response outputs for 4032 Al-alloy. This can be done by proposing an approach that combines Taguchi method with grey relational analysis. Three cutting parameters have been selected (spindle speed, feed rate and cut depth) with three levels for each parameter. Three tools with different materials and geometry have been also used to design the experimental tests and runs based on matrix L9. The end milling process with several output characteristics is solved using a grey relational analysis. The results of analysis of variance (ANOVA) showed that the major influencing parameters on multi-objective response w
... Show MoreAbstract
Research aims : The aim of the research is to evaluate the reality of the inspection teams' work in the health institutions belonging to Dhi-Qar health office .
Purpose: This research seeks to present a point of view based on knowing the extent of health service quality in Dhi-Qar governorate and discover the role of the inspection teams in enhancing the health service.
Design / Methodology/ Approach: The experimental method has been used and the questionnaire has also been used to collect data in order to develop a reliable and correct measurement model for the research's variables . The research's hypotheses have been tested through using some statistical treat
... Show MoreObjectives: The study aims to evaluate the application of monitoring indicators for maternal, newborn and
child health through the evaluation of impact and coverage health indicators and to evaluate the usefulness of the
application of these indicators at sub primary health care centers in Baghdad City.
Methodology: A descriptive comparative design, which is using the evaluation approach, has been steered at
Sub Primary Health Centers of Baghdad City in order to evaluate the application; impact and coverage, and the
usefulness of monitoring indicators for maternal, newborn and child health from December 4th 2017 to April 29th
2018. A multistage, "non-probability" convenient, sample is selected for the present study. A t
The current research aims to identify the level of impact of strategic improvisation as an independent variable on organizational health. The dependent variable in the Department of Health of Dhi Qar to reach appropriate mechanisms in order to reach appropriate mechanisms and recommendations proposed to contribute to the achievement of organizational health in the Department of Health of Dhi Qar (the research department) and based on the importance of the subject of research in government institutions and the important and service role of the Department of Health of Dhi Qar in the Iraqi society. The descriptive analytical approach was adopted in the completion of the research based on the opinions of the leaders in the surveyed depa
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MorePathology reports are necessary for specialists to make an appropriate diagnosis of diseases in general and blood diseases in particular. Therefore, specialists check blood cells and other blood details. Thus, to diagnose a disease, specialists must analyze the factors of the patient’s blood and medical history. Generally, doctors have tended to use intelligent agents to help them with CBC analysis. However, these agents need analytical tools to extract the parameters (CBC parameters) employed in the prediction of the development of life-threatening bacteremia and offer prognostic data. Therefore, this paper proposes an enhancement to the Rabin–Karp algorithm and then mixes it with the fuzzy ratio to make this algorithm suitable
... Show MoreThis paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)
... Show MoreA new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments
In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More