Preferred Language
Articles
/
joe-509
Determination Optimum Inventory Level for Material Using Genetic Algorithm
...Show More Authors

The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period.                                                    This study was applied in Wasit Company for Textile Manufacturing in the Textile Factory, where it produces five products, which are printed striped, plain, poplin, dyed poplin and Naba weave.  The products are made from cotton and they are passing through several stages to transfer to the final product. A genetic algorithm is used to determine the optimum quantity of the purchase a cotton and colors for each month and with minimum cost. Where the purchasing and transportation costs were either constant or variable with respect to purchased quantities while holding cost is kept constant. The results showed that the total cost of the first model is minimum than the second model because the holding cost for this model is less from the second model, while the purchasing and transportation costs from two models are equals. The percentage of purchasing cost for cotton is the biggest value, more 99% of purchasing cost for two models.

                        

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Science
Telescope Mirror Cleaning Using Atmospheric Pressure Multi-Channel Radio Frequency Plasma Jet
...Show More Authors

     In this work, the surface of the telescope’s mirror is cleaned using an atmospheric-pressure radio frequency plasma jet (APRFPJ), which is generated by Argon gas between two coaxial metal electrodes. The RF power supply is set to 2 MHz frequencies with three different power levels: 20, 50, and 80 W. Carbon, that has adhered to the surface, can be effectively removed using the plasma cleaning technique, which also modifies any residual bonds. The cleaned surface was clearly distinguished using an optical emission spectroscopy (OES) technique and a water contact angle (WCA) analyzer for the activation property on their surfaces. The sample showed a super hydrophilic surface at an angle of 1° after 2.5 minutes of plasma tre

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Sumer Journal For Pure Science
COVID-19Disease Diagnosis using Artificial Intelligence based on Gene Expression: A Review
...Show More Authors

Publication Date
Sat Oct 29 2022
Journal Name
Current Trends In Geotechnical Engineering And Construction (pp.52-61)
Simulation of Residual Chlorine in Al-Yarmouk Drinking Water System Using WaterGEMS
...Show More Authors

Abstract To ensure that the distribution system has safe drinking water. It is necessary to know the residual chlorine concentrations at various points in the network. A chlorine photometer device was used to measure twenty points taken every day for a week at a selected time in the distribution system. Both pressures and flows in the network were measured using bourdon gauge and Tuf-2000H Handheld Digital ultrasonic flow meters. WaterGEMS CONNECT Edition update one software was used to simulate the flow in the network. The Baghdad water department provided the data about the network, such as the lengths of pipes, the layout of the network, and pipes diameters. The network calibrated consists of 781 pipes of different lengths and 542 juncti

... Show More
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Increasing Safety in Highways Transit Systems by Using Ethical Artificial Intelligence AI
...Show More Authors

“Smart city” projects have become fully developed and are actively using video analytics. Our study looks at how video analytics from surveillance cameras can help manage urban areas, making the environment safer and residents happier. Every year hundreds of people fall on subway and railway lines. The causes of these accidents include crowding, fights, sudden health problems such as dizziness or heart attacks, as well as those who intentionally jump in front of trains. These accidents may not cause deaths, but they cause delays for tens of thousands of passengers. Sometimes passers-by have time to react to the event and try to prevent it, or contact station personnel, but computers can react faster in such situations by using ethical

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Our Dermatology Online
Treatment of active acne vulgaris by chemical peeling using 88% lactic acid
...Show More Authors

KE Sharquie, AA Noaimi, EA Al-Janabi, Our Dermatology Online, 2014 - Cited by 11

View Publication
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Sat Mar 08 2025
Journal Name
Fusion: Practice And Applications
Fast Numeric Sign Detection Using Adaptive Thresholding and Geometry of Optimized Fingers
...Show More Authors

A strong sign language recognition system can break down the barriers that separate hearing and speaking members of society from speechless members. A novel fast recognition system with low computational cost for digital American Sign Language (ASL) is introduced in this research. Different image processing techniques are used to optimize and extract the shape of the hand fingers in each sign. The feature extraction stage includes a determination of the optimal threshold based on statistical bases and then recognizing the gap area in the zero sign and calculating the heights of each finger in the other digits. The classification stage depends on the gap area in the zero signs and the number of opened fingers in the other signs as well as

... Show More
Scopus
Publication Date
Sun Mar 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Experimental and Numerical Analysis of Laser Surface Melting by Using Enthalpy Method
...Show More Authors
Abstract<p>In this study, experimental and numerical applied of heat distribution due to pulsed Nd: YAG laser surface melting. Experimental side was consists of laser parameters are, pulse duration1.3<italic>ms</italic>, wavelength 1064nm, laser energies 1.5, 2. 6 and 4.3 J, laser beam diameter is 0.6 mm and spot diameter 0.78 mm was applied a low carbon steel type St37 with a dimension 10, 10, 3 mm, length, width and thickness respectively. Numerical analysis side consist of a mathematical model and calculating a thermal cycle by using equation in the enthalpy method applied to determine the cooling rate in fusion zone. The simulation by using the enthalpy method, applied on conduction heat transfer </p> ... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Corrosion behavior of mild-steel in cooling towers using high salinity solution
...Show More Authors

Cooling towers is one of the most important unit in industry, they are used to dispose heat from cooling media used in the integrated units. The choice of the cooling media plays recently an important rule due to fresh-water scarcity. The use of saline as a cooling media become of growing interest, but the corrosion problem has to be taken in consideration. In this study the simultaneous effect of cooling tower operation parameters on the corrosion rate of mild-steel is considered. The role of NaCl content is found to be pronounced more than the working solution temperature and flowrate. The corrosion of mild-steel in these studied factors had shown an interesting result especially with the NaCl% content. Firstly, there was an increase in t

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref