Transportation and distribution are the most important elements in the work system for any company, which are of great importance in the success of the chain work. Al-Rabee factory is one of the largest ice cream factories in Iraq and it is considered one of the most productive and diversified factories with products where its products cover most areas of the capital Baghdad, however, it lacks a distribution system based on scientific and mathematical methods to work in the transportation and distribution processes, moreover, these processes need a set of important data that cannot in any way be separated from the reality of fuzziness industrial environment in Iraq, which led to use the fuzzy sets theory to reduce the levels of uncertainty. The decision-maker has several goals that he aspires to accomplish for two stages, so, the decision-maker adopted in his work system on a multi-objective travelling salesman problem. A network of paths for transportation and distribution of the products has been designed based on a multi-objective travelling salesman problem, by building a mathematical model that finds the best paths for each stage, taking into account the goals required by the decision-maker. The results obtained from the use of (Lingo) software showed the importance of these methods in determining the optimal path for the processes of collecting and transporting milk from their collection centers to the Al-Rabee factory as a first stage, as well as transporting the final products and distributing them from the Al-Rabee factory to the shopping centers as a second stage.
This research investigated the importance and priorities of the project overhead costs in Iraq via a questionnaire using the fuzzy analytic hierarchy process technique (FAHP). Using this technique is very important in the uncertain circumstances as in our country. The researcher reached to frame an equation through the results of the priorities of weights include the percentages of each of the main items of the project overhead costs. The researcher tested this equation by applying it to one of the completed projects and the results showed suitability for the application. The percentages of the (salaries, grants, and incentives) and (fieldwork requirements) in equation represent approximately two-thirds of project overhe
... Show MoreA simple, rapid, accurate and sensitive spectrophotometric method has been developed for the determing carbamate pesticides in both pure and water samples. The method is appropriate for the determination of carbofuran in the presence of other ingredients that are usually available in dosage forms. The effect of organic solvents on the spectrophotometric properties of the azo dye and the structure of the resulting product have also been worked out and it is found to be 1:1 benzidine :carbofuran. The method can be successfully applied to determination of carbofuran in water samples. The method is based on diazotization of Benzidine (4, 4 – diamino biphenyl) with sodium nitrite and hydrochloric acid followed by coupling with carbofuran
... Show MoreGround water hydrochemical study in Yusufiyah depends upon (25) wells where major cations and anions were obtained as well as trace elements. The hydrochemical properties include the study of (pH, EC, TDS, and TH). The groundwater of the study area is odorless and colorless except the wells (13 and 16) with a salty taste due to the elevated (TDS) concentration in it, where the wells depth ranges between 7-20 meters. Depth of water in these wells was about 25-35 meters above sea level. Groundwater generally flows from east to west and from north east to south west. The resource of groundwater depends upon surface water. Physical specifications are measured in the water samples included temperature, color, taste, odor, pH, electrical condu
... Show MoreDeep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d
... Show MoreAbstract
The aim of the current research is to prepare an integrated learning program based on mathematics standards for the next generation of the NYS and to investigate its impact on the development of the teaching performance of middle school mathematics teachers and the future thinking skills of their students. To achieve the objectives of the research, the researcher prepared a list of mathematics standards for the next generation, which were derived from a list of standards. He also prepared a list of the teaching competencies required for middle school mathematics teachers in light of the list of standards, as well as clarified the foundations of the training program and its objectives and the mathematical
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More