In general, the importance of cluster analysis is that one can evaluate elements by clustering multiple homogeneous data; the main objective of this analysis is to collect the elements of a single, homogeneous group into different divisions, depending on many variables. This method of analysis is used to reduce data, generate hypotheses and test them, as well as predict and match models. The research aims to evaluate the fuzzy cluster analysis, which is a special case of cluster analysis, as well as to compare the two methods—classical and fuzzy cluster analysis. The research topic has been allocated to the government and private hospitals. The sampling for this research was comprised of 288 patients being treated in 10 hospitals. As t
... Show MoreAn optimization study was conducted to determine the optimal operating pressure for the oil and gas separation vessels in the West Qurna 1 oil field. The ASPEN HYSYS software was employed as an effective tool to analyze the optimal pressure for the second and third-stage separators while maintaining a constant operating pressure for the first stage. The analysis involved 10 cases for each separation stage, revealing that the operating pressure of 3.0 Kg/cm2 and 0.7 Kg/cm2 for the second and third stages, respectively, yielded the optimum oil recovery to the flow tank. These pressure set points were selected based on serval factors including API gravity, oil formation volume factor, and gas-oil ratio from the flow tank. To impro
... Show MoreThe current study looked into heavy metal poisoning of the Euphrates river which runs from Al-Kifl to Kufa in Iraq. One of the goals of this research was to determine the pollution levels and the contamination sources. We looked at six heavy metal (Cd, Pb, Zn, Cr, Fe, and Mn) characteristics in sediment, taking samples from six sites along the Euphrates every season from March 2020 to January 2021. To assess pollution levels, three indices were chosen: enrichment factor (EF), geo-accumulation index (I-geo) and contamination factor (CF). According to EF, the Cd and Pb elements recorded considerable enrichment, very high enrichment and extremely high pollution at practically all sites in four seasons, while the remainder of the HMs recorde
... Show MoreThe Arabic calligraphy, in the early days of Islam, was used for the purpose of decorating the walls of mosques from inside and outside. Hence, this decorative art must be actively involved in enriching the designs of Islamic fabrics and costumes because it has a highly qualified and aesthetically pleasing look and expresses the originality of the Arab spirit. The research is divided into two section: the first section included the following topics: First "A historical overview of the art of decoration in Islamic Arab thought". Second "linear formations of decorative designs, and the subject of intellectual aesthetic taste of the art of decorating. This section tackles two subsections: first "the beauty of thought between the function an
... Show MoreLet be any group with identity element (e) . A subgroup intersection graph of a subset is the Graph with V ( ) = - e and two separate peaks c and d contiguous for c and d if and only if , Where is a Periodic subset of resulting from . We find some topological indicators in this paper and Multi-border (Hosoya and Schultz) of , where , is aprime number.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThe bifurcation of the constitutional rights of one of the techniques used by the constitutional court to expand the scope of the constitutional right to explicit, and access to the fact that guarantees constitutional rights, and establishes the constitutional elimination of this technique on a particular bond is the constitutional terms of reference, and in the light of his discretion in the exercise of the constitutional powers of , and tends at times To the adoption of a broad branching approach, which confers on the constitutional text containing constitutional rights a wider scope than the scope of an explicit right.