The road networks is considered to be one of the determinants that controls to specify the areas of human activities, which it depend on to specify the arrival cost , in addition it is useful to achieve the connectivity for interaction and human activities , and shorten the distance and time between the population and places of service. The density of the road network in any space directly affected by the density of population and the type of economic activities and administrative functions performed by the space. On this basis, the subject of this study is reflected in the quantitative analysis of the roads network in the Governorate of Karbala. The study consists the quantitative analysis for the roads network and the Urban Nodes in th
... Show MoreThis paper presents a minimum delay congestion control in differentiated Service communication networks. The premium and ordinary passage services based fluid flow theory is used to build the suggested structure in high efficient manage. The established system is capable to adeptly manage both the physical network resource limitations and indefinite time delay related to networking system structure.
Estimation of the names and verbs of some letters to consider the grammatical industry
The survival analysis is one of the modern methods of analysis that is based on the fact that the dependent variable represents time until the event concerned in the study. There are many survival models that deal with the impact of explanatory factors on the likelihood of survival, including the models proposed by the world, David Cox, one of the most important and common models of survival, where it consists of two functions, one of which is a parametric function that does not depend on the survival time and the other a nonparametric function that depends on times of survival, which the Cox model is defined as a semi parametric model, The set of parametric models that depend on the time-to-event distribution parameters such as
... Show MoreBackground & objective: Difficult intubation remains a risk for patients undergoing general anesthesia (GA) or mechanical ventilation in an intensive care unit (ICU). Macroglossia is a known factor for difficult intubation. But it is not routine to assess the tongue size to predict difficult intubation. Studies are found deficient in comparing usefulness of measuring thyromental distance and the tongue thickness (TT) measured by ultrasonography to estimate difficult intubation. We compared tongue thickness measured by ultrasonography and thyromental distance as a means to anticipate difficult intubation. Methodology: A convenient sample of 60 patients; 32 males and 28 females, who were undergoing elective surgery with GA were i
... Show MoreMultiple Sclerosis (MS), is a common autoimmune disease that affects the central nervous system. Currently, there is no cure for MS, and most treatments involve the use of immunosuppressive drugs that can have adverse effects or increased toxicity. Cannabis, commonly known as marijuana, is a product of the Cannabis sativa, and for several centuries has been used as an alternative medicine in many cultures. Cannabis sativa produces over 421 chemical compounds, including about 80 terpenophenols named phytocannabinoids, and include both psychotropic THC and non-psychoactive CBD. In the currently study, we show that a combination therapy using THC and CBD results in amelioration of EAE, a
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More