In many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an
... Show MoreFor the period from February 2014 till May 2014, one hundred and nine lactose fermenter clinical isolates from different samples (urine, stool, wound swab, blood, and sputum) were collected from Alyarmok, Alkadimiya, and Baghdad teaching hospitals at Baghdad governorate. Identification of all Klebsiella pneumoniae isolates were carried out depending on macroscopic, microscopic characterizations, conventional biochemical tests, and Api 20E system. Fifty-three (48.62%) isolates represented K. pneumoniae; however, 51.73% represented other bacteria. Susceptibility test was achieved to all fifty-three K. pneumoniae isolates using five antibiotic disks (Ceftazidime, Ceftriaxone, Cefotaxime, Imipenem, and Meropenem). Most of tested isolates (90
... Show MorePersistence of antibiotics in the aquatic environment has raised concerns regarding their potential influence on potable water quality and human health. This study analyzes the presence of antibiotics in potable water from two treatment plants in Baghdad City. The collected samples were separated using a solid-phase extraction method with hydrophilic-lipophilic balance (HLB) cartridge before being analyzed. The detected antibiotics in the raw and finished drinking water were analyzed and assessed using high-performance liquid chromatography (HPLC), with fluorometric detector and UV detector. The results confirmed that different antibiotics including fluoroquinolones and
Background: Human Cytomegalovirus (HCMV) infects a wide range of human cells, including colonic epithelial cells that give rise to adenomas and adenocarcinomas. Persistent productive infection of tumor cells is essential for oncomodulation by HCMV.This study aimed to detect HCMV matrix protein using in situ hybridization technique (ISH) in colorectal adenocarcinoma compared to normal colon tissues, and to the presence of cytomegalovirus inclusion bodies in infected colorectal carcinomas.
Patients and methods: Twenty six of colorectal adenocarcinomas were obtained in paraffin-blocks compared to 10 normal colon specimens which were age and sex matched as control group. Detection of HCMV was obtained by in s
Background:Pediatric acute myeloid leukemia (AML) has a poor prognosis, and novel therapies are needed. The FLT3 tyrosine kinase inhibitorsrepresents a promising target in pediatric AML.
Objectives:This study was done to estimate the frequency of FLT3- ITD mutation in childhood acute myeloid leukemia using conventional PCR & correlate this mutation with the clinical presentation and response to induction therapy.
Patients, Materials &Methods: Twenty children with AML, and 16 children with reactive bone marrow as negative control were enrolled in this study. Those patients were attending Child Welfare Teaching Hospital in Baghdad from March 2010 to July 2011 .For each patient hematological investigations including complete b
Human skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu
... Show MoreThe research amid to find out the extent of Iraqi oil companies commitment to implement internal control procedures in accordance with the updated COSO framework. As the research problem was represented in the fact that many of the internal control procedures applied in the Iraqi oil companies are incompatible with most modern international frameworks for internal control, including the integrated COSO framework, issued by the Committee of Sponsoring Organizations of the Tradeway Committee. The research followed the quantitative approach to handling and analysing data by designing a checklist to represent the research tool for collecting data. The study population was represented in the Iraqi oil companies, while the study sample
... Show MoreZubair Formation is the most productive reservoir in southern Iraq, which is comprised of sandstones, interbedded with shale sequences and sometimes carbonate rock. It is an important formation in the lower Cretaceous cycle in Iraq. Rumaila oil field is the largest oil field in Iraq and the 6th in the world. Two wells were studied for three depths, one in the southern Rumaila and the other in the north. The study focused on light and heavy minerals in sand fractions and their relationship with hydrocarbon assemblages. For the survey to be complete, the sedimentological study of the cores was also conducted. This research aims to determine the effect of the amount of heavy and light minerals on the generation and production of
... Show MoreRegarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra
... Show More