Were analyzed curved optical fates Almarchih absolute colony of the binary type, the Great Palmstqrh using mathematical relationships derived for that and that gave us the results closer to the results of the observed spectral Great Colonial
... Show MoreClarity and Visual Ratios of the Vibrant Place Making
This research analyzes the level of the short circuit effect of the Iraqi super network and decides the suitable location for the High Voltage Direct Current (HVDC) connections in order to obtain the best short circuit reduction of the total currents of the buses in the network. The proposed method depends on choosing the transmission lines for Alternating current (AC) system that suffers from high Short Circuit Levels (SCLs) in order to reduce its impact on the transmission system and on the lines adjacent to it and this after replacing the alternating current (AC) line by direct current (DC) line. In this paper, Power System Simulator for Engineering (PSS/E) is used to model two types of HVDC lines in an effective regi
... Show MoreBackground: Refractory/relapsed acute leukemia has always been a challenging problem for hematologist. Over the past decade emphasis has been made in the development of regimens containing fludarabine, combined with cytosine arabinoside for the treatment of refractory/relapsed acute leukemias. The aim of this study is to evaluate the efficacy and toxicity of the combination of fludarabine, high dose cytarabine, and granulocyte colony stimulating factor in refractory relapsed cases of acute leukaemia,
Methods: a prospective study is being conducted at the national center of hematology and hematology unit /Baghdad teaching hospital from July 2008 to July 2010.Twenty Patients with refractory/relapsed acute leukemia were treated with flud
In recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al
... Show MoreThis research introduces a proposed hybrid Spam Filtering System (SFS) which consists of Ant Colony System (ACS), information gain (IG) and Naïve Bayesian (NB). The aim of the proposed hybrid spam filtering is to classify the e-mails with high accuracy. The hybrid spam filtering consists of three consequence stages. In the first stage, the information gain (IG) for each attributes (i.e. weight for each feature) is computed. Then, the Ant Colony System algorithm selects the best features that the most intrinsic correlated attributes in classification. Finally, the third stage is dedicated to classify the e-mail using Naïve Bayesian (NB) algorithm. The experiment is conducted on spambase dataset. The result shows that the accuracy of NB
... Show More