Preferred Language
Articles
/
joe-509
Determination Optimum Inventory Level for Material Using Genetic Algorithm
...Show More Authors

The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period.                                                    This study was applied in Wasit Company for Textile Manufacturing in the Textile Factory, where it produces five products, which are printed striped, plain, poplin, dyed poplin and Naba weave.  The products are made from cotton and they are passing through several stages to transfer to the final product. A genetic algorithm is used to determine the optimum quantity of the purchase a cotton and colors for each month and with minimum cost. Where the purchasing and transportation costs were either constant or variable with respect to purchased quantities while holding cost is kept constant. The results showed that the total cost of the first model is minimum than the second model because the holding cost for this model is less from the second model, while the purchasing and transportation costs from two models are equals. The percentage of purchasing cost for cotton is the biggest value, more 99% of purchasing cost for two models.

                        

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Art Image Compression Based on Lossless LZW Hashing Ciphering Algorithm
...Show More Authors
Abstract<p>Color image compression is a good way to encode digital images by decreasing the number of bits wanted to supply the image. The main objective is to reduce storage space, reduce transportation costs and maintain good quality. In current research work, a simple effective methodology is proposed for the purpose of compressing color art digital images and obtaining a low bit rate by compressing the matrix resulting from the scalar quantization process (reducing the number of bits from 24 to 8 bits) using displacement coding and then compressing the remainder using the Mabel ZF algorithm Welch LZW. The proposed methodology maintains the quality of the reconstructed image. Macroscopic and </p> ... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Mathematics
Face Recognition Algorithm Based on Fast Computation of Orthogonal Moments
...Show More Authors

Face recognition is required in various applications, and major progress has been witnessed in this area. Many face recognition algorithms have been proposed thus far; however, achieving high recognition accuracy and low execution time remains a challenge. In this work, a new scheme for face recognition is presented using hybrid orthogonal polynomials to extract features. The embedded image kernel technique is used to decrease the complexity of feature extraction, then a support vector machine is adopted to classify these features. Moreover, a fast-overlapping block processing algorithm for feature extraction is used to reduce the computation time. Extensive evaluation of the proposed method was carried out on two different face ima

... Show More
View Publication
Scopus (34)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of King Saud University - Computer And Information Sciences
Heuristic initialization of PSO task scheduling algorithm in cloud computing
...Show More Authors

View Publication
Scopus (167)
Crossref (123)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Driver and Posner Models in correcting Alternative Perceptions in Educational Psychology Material for the Students at the Institute of Fine Arts
...Show More Authors

To achieve the goals, the researcher followed the design of equal and   independent groups of partial control and post-test . The research has chosen the Institute of Fine Arts in the area Almansour area as deliberate sample where three sections of students have been chosen and the   number of students is (69) students. The researcher conducted equivalence in the variables (age, and IQ , and the overall rate for grade III). in diagnostic phase,  (21) concepts of alternative    image out of (46) concepts have been identified in addition to the goals of formulation of acquisition concepts according to the three processes (definition, discrimination and application). Achievement test has been

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Microporous And Mesoporous Materials
Green synthesis of porous carbon cross-linked Y zeolite nanocrystals material and its performance for adsorptive removal of a methyl violet dye from water
...Show More Authors

The cost-effective carbon cross-linked Y zeolite nanocrystals composite (NYC) was prepared using an eco-friendly substrate prepared from bio-waste and organic adhesive at intermediate conditions. The green synthesis method dependent in this study assures using chemically harmless compounds to ensure homogeneous distribution of zeolite over porous carbon. The greenly prepared cross-linked composite was extensively characterized using Fourier transform infrared, nitrogen adsorption/desorption, Field emission scanning electron microscope, Dispersive analysis by X-ray, Thermogravimetric analysis, and X-ray diffraction. NYC had a surface area of 176.44 m2/g, and a pore volume of 0.0573 cm3/g. NYC had a multi-function nature, sustained at a long-

... Show More
View Publication
Crossref (42)
Crossref
Publication Date
Tue Mar 01 2022
Journal Name
The International Journal Of Nonlinear Analysis And Applications
Improved optimality checkpoint for decision making by using the sub-triangular form
...Show More Authors

Decision-making in Operations Research is the main point in various studies in our real-life applications. However, these different studies focus on this topic. One drawback some of their studies are restricted and have not addressed the nature of values in terms of imprecise data (ID). This paper thus deals with two contributions. First, decreasing the total costs by classifying subsets of costs. Second, improving the optimality solution by the Hungarian assignment approach. This newly proposed method is called fuzzy sub-Triangular form (FS-TF) under ID. The results obtained are exquisite as compared with previous methods including, robust ranking technique, arithmetic operations, magnitude ranking method and centroid ranking method. This

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Enhancement of the Blood Glucose Level for Diabetic Patients Based on an Adaptive Auto-Tuned PID Controller via Meta-Heuristic Methods
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 25 2026
Journal Name
Modern Sport
The reasons for the failure of simple assault and its relationship to the level of levelp performance skill players weapon sword
...Show More Authors

The method of analysis is one of the tools the coach to identify strengths andweaknesses of each player, and how to avoid mistakes that in the course ofperformance on the other hand, Voslob analysis is important for the player, as throughthe analysis will determine the capacity enjoyed by both the coach and player, as wellas being the possibility of progress in a scientific manner thoughtful, and also helps inthe evaluation of physical and skill level and tactical, psychological and trainingcapacity of the coach in order to avoid obstacles and make the coach is movingtowards the right track to improve the good level, and then an investigation tocomplete higher education.Hence the importance of research in the analysis of simple attack and n

... Show More
View Publication