After the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of blast. Accordingly, must been have adopted a changing philosophy to provide appropriate and effective protection for preservation of psyche and building occupants, by establishment of a protected perimeter and the design of a debris mitigating facade, the isolation of internal explosive threats that may to dodge detection through the screening stations or may enter the public spaces prior to screening and the protection of the emergency evacuation, rescue and recovery systems. By reason of this above-mentioned, the study simple contribution of determined phenomena risk containment. Moreover, in this study may be applied remote sensing (RS) and geographic information system (GIS) techniques to estimation the blast wave overpressure of bomb explosive effecters for damage that building of materials (i.e., facade, building glass, secondary of roof, fashioning tools and furniture), and how avoid this problem, therefore, selection justice ministry of Iraq building in Salehyiea region at Baghdad city, it destroyed at 28/10/2009 by motocar bombs explosion.
In this paper, one of the Machine Scheduling Problems is studied, which is the problem of scheduling a number of products (n-jobs) on one (single) machine with the multi-criteria objective function. These functions are (completion time, the tardiness, the earliness, and the late work) which formulated as . The branch and bound (BAB) method are used as the main method for solving the problem, where four upper bounds and one lower bound are proposed and a number of dominance rules are considered to reduce the number of branches in the search tree. The genetic algorithm (GA) and the particle swarm optimization (PSO) are used to obtain two of the upper bounds. The computational results are calculated by coding (progr
... Show MoreComputer theoretical study has been carried out on the design of five electrode immersion electrostatic lens used in electron gun application. The finite element method (FEM) is used in the solution of the Poisson's equation fro determine axial potential distribution, the electron trajectory under Zero magnification condition . The optical properties : focal length ,spherical and chromatic aberrations are calculated,From studying the properties of the designed electron gun. we have good futures for these electron gun where are abeam current 4*10-4A can be supplied by using cathode tip of radius 100 nm.
In this paper we will investigate some Heuristic methods to solve travelling salesman problem. The discussed methods are Minimizing Distance Method (MDM), Branch and Bound Method (BABM), Tree Type Heuristic Method (TTHM) and Greedy Method (GRM).
The weak points of MDM are manipulated in this paper. The Improved MDM (IMDM) gives better results than classical MDM, and other discussed methods, while the GRM gives best time for 5≤ n ≤500, where n is the number of visited cities.
The focus of this research lies in the definition of an important aspect of financial development, which is reflected on the alleviation of poverty in Iraq, namely financial inclusion and then taking the path of achieving a sustainable economy, certainly after reviewing one of the important international experiences in this regard and finally measuring the level of financial inclusion in Iraq and its impact on poverty reduction through the absolute poverty line indicator.
The aim of this study was to study chemical constituents of aerial parts of Cardaria draba since no phytochemical investigation had been studied before in Iraq. Aerial parts of Cardaria draba were defatted by maceration in hexane for 72 h. The defatted plant materials were extracted using Soxhlet apparatus, the aqueous Methanol 90% as a solvent extraction for 18 h, and fractionated with petroleum ether- chloroform (CHCl3)- ethylacetate- and n-butanol respectivly. The ethyl acetate, n-butanol, and n-butanol after hydrolysis fractions were investigated by high performance liquid chromatography (HPLC) and thin-layer chromatography (TLC) for its phenolic acid and flavonoid contents. Flavono
... Show MoreGangyong Lee, S.Tariq Rizvi, and Cosmin S.Roman studied Rickart modules.
The main purpose of this paper is to develop the properties of Rickart modules .
We prove that each injective and prime module is a Rickart module. And we give characterizations of some kind of rings in term of Rickart modules.
Fluoroscopic images are a field of medical images that depends on the quality of image for correct diagnosis; the main trouble is the de-nosing and how to keep the poise between degradation of noisy image, from one side, and edge and fine details preservation, from the other side, especially when fluoroscopic images contain black and white type noise with high density. The previous filters could usually handle low/medium black and white type noise densities, that expense edge, =fine details preservation and fail with high density of noise that corrupts the images. Therefore, this paper proposed a new Multi-Line algorithm that deals with high-corrupted image with high density of black and white type noise. The experiments achieved i
... Show MoreThe searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding pro
... Show MoreLet R be a commutative ring with identity and let M be a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of semi-essential submodules which introduced by Ali S. Mijbass and Nada K. Abdullah, and we make simple changes to the definition relate with the zero submodule, so we say that a submodule N of an R-module M is called semi-essential, if whenever N ∩ P = (0), then P = (0) for each prime submodule P of M. Various properties of semi-essential submodules are considered.
This paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be
... Show More