In this research, the problem of multi- objective modal transport was formulated with mixed constraints to find the optimal solution. The foggy approach of the Multi-objective Transfer Model (MOTP) was applied. There are three objectives to reduce costs to the minimum cost of transportation, administrative cost and cost of the goods. The linear membership function, the Exponential membership function, and the Hyperbolic membership function. Where the proposed model was used in the General Company for the manufacture of grain to reduce the cost of transport to the minimum and to find the best plan to transfer the product according to the restrictions imposed on the model.
Background: Extracorporeal Shock wave lithotripsy (ESWL) is widely used in treating patients with ureteralstones because it is effective, safe, and noninvasive. Based on factors such as size and the location of stones,there is a significant variation in the overall stone-free rate (SFR).Aim of the study: To evaluate the effect of ureteral wall thickness (UWT), stone attenuation, the time fromfirst attack of pain till first session of ESWL and stone/ rib density on the outcome of SWL in the treatmentof upper ureteral stones (UUS).Patient and methods: A prospective study when 127 patients with radio-opaque UUS ranging from 7 to 20mm and treated by ESWL were included in this study. The effect of (stone/ 12th rib) density by KUB, ureter
... Show MoreThe objective of this work is to investigate the performance of a conventional three phase induction motor supplied by unbalanced voltages. An effort to study the motor steady state performance under this disturbance is introduced. Using per phase equivalent circuit analysis with the concept of symmetrical components approach, the steady state performance is theoretically calculated. Also, a model for the induction motor with the MATLAB/Simulink SPS tools has been implemented and steady state results were obtained. Both results are compared and show good correlation as well. The simulation model is introduced to support and enhance electrical engineers with a complete understanding for the steady state performance of a fully loaded induc
... Show MoreThis study is the first investigation in Iraq dealing with genotyping of
Epstein-Barr Virus (EBV) infection is associated with broad spectrum of clinical manifestationsdepending on the immune status of the host, To analyze their possible role in the complication ofautoimmune hepatitis, we investigated (30) female patients with autoimmune hepatitis type-1 of(10-40)years and 25 healthy female of same ages(control groups). Both groups were carried outto measure the levels of EBV-CA IgM, IgG Ab, EBV-EA IgM, IgG Ab, and EBV-NA IgM, IgGAb using indirect immunoflourescent assay (IFAT).The prevalence of EBV-CA IgM, IgG Ab were(10%,20%) and EBV-EA IgM, IgG Ab were (10% and20%) respectively, while the prevalence ofEBV-NA IgG Ab was( 3.33%) and there are no prevalence of EBV-NA IgM Ab. There weresignificant differences (P
... Show MoreThis paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.
Al Huweizah Marsh is considered as the largest marsh at the southern part of Iraq. About one third of the marsh is located within the Iranian territory. Iran began to construct earth dikes along the Iraqi-Iranian international borders to separate the Iranian part of the marsh. The electrical conductivity, EC, value was adopted to be the indicator for the water salinity within the marsh. A steady two-dimensional water quality routing model was implemented by using the RMA2 and RMA4 softwares within the SMS computer package to estimate the distribution of the
EC values within the marsh seasonally during the wet, moderate and dry water years. The EC distribution Patterns were estimated considering the expected two cases of the marsh futu
Background: One of the significant public health problems is the traumatic dental injury to the anterior teeth, it has a great impact on children’s daily. Physical and psychological disturbance, pain and other negative impacts, such as tendency to avoid laughing or smiling may be associated with traumatic dental injuries, that may affect the social relationships. To determine the occurrence of traumatic dental injuries in relation to quality of life, this study was established among children of primary schools. Material and Methods: A cross-sectional study was conducted among private (574) and governmental (1026) primary school children in Baghdad city. Dental trauma was assessed according to Ellis and Davey classification in1970
... Show MoreThe researcher attempts to examine Barman model in acquiring the historical concepts among fourth-grade students at literary classrooms. To this end, the researcher held the null hypothesis, there is no significant difference between the experimental groups who was taught based on Barman model and the control group that taught based on the traditional method in acquiring the historical concepts on the post-test. To testify the effectiveness of Barman model, the researcher administered a questionnaire included (60) items on bunch of female-students who were selected from al-khamaeal preparatory school in al-hurriyah district in Baghdad. The author utilized different statistical tools to analyze the collected data. &
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More