In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.
Leukemia is the most common cancer in children which causes death despite the high survival rate. Therefore, new methods are required to find a suitable therapy. A small RNA called microRNAs (miRNAs) is used as a biomarker for cancer diagnosis and early prognostic evaluation. Expression levels of three miRNAs from the 3' arm (miR-142-3p, miR-223-3p and miR-146-3p) were detected in serum samples from 30 acute leukemic children and from 30 healthy individuals by using qPCR. The miR-142-3p and miR-146-3p profiles were significantly downregulated (P=0.0010 and 0.0012, respectively), while miR-223 was found to be significantly upregulated (P= 0.0044) in the pateints. Serum level of C/EBP-β
... Show MoreA field experiment was conducted at botanical garden of Department of Biology, College of Education for Pure Science (Ibn Al-Haitham), University of Baghdad, during the growth winter season of 2016-2017 to study the effect of different concentrations (0, 10, 20) mg.L-1 of abscisic acid and (0, 50, 100, 150) mg.L-1 of vitamin C and their interaction on some plant hormones of pea plant (Pisum sativum L.). The results showed that ABA 20 mg.L-1 decreased IAA about 27.44%, GA3 about 19.73% and Kinetin 15.37% while vitamin C with 150 mg.L-1 increased IAA 27.43%, GA3 45.31% and Kinetin 58.53%, but ABA increased about 23.01% for ABA and 34.93% for vitamin C compared with
... Show MoreThe present study aimed to investigate the toxic and mutagenic and anti – mutagenic effects of the aqueous extract (5, 10 and 15 mg/kg) of green tea (Camellia sinensis) in modulating the genotoxic effects of mitomycin C (MMC). Albino male mice (Mus musculs) were employed as a biological system and four parameters were performed in vivo; total leucocyte count, mitotic index, chromosomal aberrations and micronucleus formation. The plant extract was evaluated through three types of treatments. In the first, the extract was given alone orally. While the second and third treatment included two types of interactions with MMC; pre – and post – MMC treatments. All treatments were paralleled by negative and positive control
... Show MoreThe demarcation in general and maritime borders in particular is an important process between any two states to define their respective regional Borders and their economic resources. This research is focused on the way in which demarcation took place between Iraq's maritime borders on the one hand and the Kuwaiti side on the other. Through satellite technology (Landsat8) and GIS can be identified the area and how the demarcation was done. The most important in addition, positive points of the demarcation have been explained. It was given a full description of the importance of the economic zone and Highlighting Iraq's most important marine facilities. More than one map of Iraq can be integrated and redesigned by GIS. This work has been t
... Show MoreA computational investigation is carried out in the field of charged particle optics with the aid of the numerical analysis methods. The work is concerned with the design of symmetrical double pole piece magnetic lens. The axial magnetic flux density distribution is determined by using exponential model, from which the paraxial-ray equation is solved to obtain the trajectory of particles that satisfy the suggested exponential model. From the knowledge of the first and second derivatives of axial potential distribution, the optical properties such as the focal length and aberration coefficients (radial distortion coefficient and spiral distortion coefficient) are determined. Finally, the pole piece profiles capable of pr
... Show MoreWhile analytical solutions to Quadratic Assignment Problems (QAP) have indeed been since a long time, the expanding use of Evolutionary Algorithms (EAs) for similar issues gives a framework for dealing with QAP with an extraordinarily broad scope. The study's key contribution is that it normalizes all of the criteria into a single scale, regardless of their measurement systems or the requirements of minimum or maximum, relieving the researchers of the exhaustively quantifying the quality criteria. A tabu search algorithm for quadratic assignment problems (TSQAP) is proposed, which combines the limitations of tabu search with a discrete assignment problem. The effectiveness of the proposed technique has been compared to well-established a
... Show MoreDecision making is vital and important activity in field operations research ,engineering ,administration science and economic science with any industrial or service company or organization because the core of management process as well as improve him performance . The research includes decision making process when the objective function is fraction function and solve models fraction programming by using some fraction programming methods and using goal programming method aid programming ( win QSB )and the results explain the effect use the goal programming method in decision making process when the objective function is
fraction .
With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show More