Preferred Language
Articles
/
nRcANo8BVTCNdQwCOGLO
An efficient artificial fish swarm algorithm with harmony search for scheduling in flexible job-shop problem
...Show More Authors

Flexible job-shop scheduling problem (FJSP) is one of the instances in flexible manufacturing systems. It is considered as a very complex to control. Hence generating a control system for this problem domain is difficult. FJSP inherits the job-shop scheduling problem characteristics. It has an additional decision level to the sequencing one which allows the operations to be processed on any machine among a set of available machines at a facility. In this article, we present Artificial Fish Swarm Algorithm with Harmony Search for solving the flexible job shop scheduling problem. It is based on the new harmony improvised from results obtained by artificial fish swarm algorithm. This improvised solution is sent to comparison to an overall best solution. When it is the better one, it replaces with the artificial fish swarm solution from which this solution was improvised. Meanwhile the best improvised solutions are carried over to the Harmony Memory. The objective is to minimize a total completion time (makespan) and to make the proposed approach as a portion of the expert and the intelligent scheduling system for remanufacturing decision support. Harmony search algorithm has demonstrated to be efficient, simple and strong optimization algorithm. The ability of exploration in any optimization algorithm is one of the key points. The obtained optimization results show that the proposed algorithm provides better exploitation ability and enjoys fast convergence to the optimum solution. As well, comparisons with the original artificial fish swarm algorithm demonstrate improved efficiency.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Facial Emotion Images Recognition Based On Binarized Genetic Algorithm-Random Forest
...Show More Authors

Most recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Sun May 27 2018
Journal Name
Journal Of Advanced Transportation
Accident Management System Based on Vehicular Network for an Intelligent Transportation System in Urban Environments
...Show More Authors

As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie

... Show More
View Publication Preview PDF
Scopus (41)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
Applying Decisions’ Theory to choose an Alternative Factor for Spatial Development in Holy Karbala Governorate
...Show More Authors

It is very well known in the planning publications that when creating spacing development to a region or sub-region, it can be able to make more than an alternative consisting with the strategic directions overtaken from the actual development of region and the situational and developmental objectives needed. However, the difficulty facing the situational planning is in selecting one of these alternatives to be the best in order to make a balanced situational re-structure, and achieving the economic, social and civil objectives. The developmental situation elements in the regions and governorates, including (Karbala) impose themselves as situational power which implies the process of re-structural arrangement where the situational develo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 03 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Construction of an Initial Assessment Documentation Tool for Nursing Recording System in Coronary Care Units
...Show More Authors

Objective : The study was carried out to construct an initial assessment documentation tool for nursing
recording system in Coronary Care Unit.
Methodology : A descriptive, purposive sample of (65) nurses was selected from CCU of main
teaching hospitals (Al Karama, Al Kindy, Al Kadimia, Al Yarmmok, Baghdad teaching hospital, Ibn
Al Naffis hospital) and Ibn-Al betar hospital in Baghdad city from the 15th of April 2004 to the 15th of
April 2006.
The instrument was constructed and comprised of two sections: section one included the
nurses' demographic characteristic; section two was the initial assessment documentation tool that
contained (2) parts including: General information form and the initial assessment form.

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Nov 28 2022
Journal Name
F1000research
In vitro apical microleakage evaluation for different endodontic sealers by spectrophotometric analysis: an observational study
...Show More Authors

Background: It has been established that several filling techniques can affect apical leakage, which is responsible for 59% of endodontic failures. The primary goal of endodontic therapy is to create a tight seal that aids in repairing the periapical tissues, prevents apical periodontitis, and shields against root canal infection. The study aims to compare the apical sealing ability of epoxy resin based sealer  (AH plus), which is an epoxy-resin-based root canal sealer, GuttaFlow 2, which is a silicone-based root canal sealer, GuttaFlow bioseal is a bioactive glass-based root canal sealer, TotalFill HiFlow bioceramic (BC) sealer is a silicate-based root canal sealer (bioceramic sealer) using a single cone techn

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Using the Artificial Gas Lift to Increase the Productivity of Noor Oil Field / Mishrif Formation
...Show More Authors

Noor Oil Field is one of Iraqi oil fields located in Missan province / Amarah city. This field is not subjected to licensing rounds, but depends on the national effort of  Missan Oil Company. The first two wells in the field were drilled in seventies and were  not opened to production until 2009. The aim of this study is to study the possibility of using the method of gas lift to increase the productivity of this field . PROSPER software was used to design the continuous  gas lift by using maximum production rate in the design.

   The design was made after comparing  the measured pressure with the calculated pressure, this comparison  show  that the method of Beggs-Brill and Petroleum Exper

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Solving the Hotdog Problem by Using the Joint Zero-order Finite Hankel - Elzaki Transform
...Show More Authors

This paper is concerned with combining two different transforms to present a new joint transform FHET and its inverse transform IFHET. Also, the most important property of FHET was concluded and proved, which is called the finite Hankel – Elzaki transforms of the Bessel differential operator property, this property was discussed for two different boundary conditions, Dirichlet and Robin. Where the importance of this property is shown by solving axisymmetric partial differential equations and transitioning to an algebraic equation directly. Also, the joint Finite Hankel-Elzaki transform method was applied in solving a mathematical-physical problem, which is the Hotdog Problem. A steady state which does not depend on time was discussed f

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Solution of the electromechanical machining problem using the collocation method based on Bernstein polynomials
...Show More Authors

0

View Publication Preview PDF