Baghdad and the other Iraqis provinces have witnessed many of celebrations which have the significant effect on the souls of Arabic and Islamic people in general , and Iraqi people, especially the birthday and death of two al-kadhimen Imams(peace upon them) and others .From here the researcher begin to study the visiting of imam kadhimen (peace upon him) on 25 Rajab the commemoration of his sacrifice, simply because have implications of religious, ideological and cultural sectors which represents in finding the greatest flow of visitors .the problem of research appeared due to the clear difference in number of visitors during one day, beside the significant increase in number of visitors through the period of visiting that reached great number on days (22-23-24 of Rajab month), also the researcher has chosen the sample of research, depending on the number of visitors in Sadir city and their neighborhoods to city of holy kadhimen, in order to identify the Maximum flow of visitors in coordination with concerned sides (Shitte affairs divan /Department of religious ceremonies /board of Al-husyania procession), (the general secretariat of holy shrine of kadhimen), (Council of Baghdad province/ governor of Sadir city 1,2), (councilarity of Baghdad /department of designs /section of geographical information), in addition to many of friends who are living near the place which leads to location of visiting ,beside the number of visitors who they done the ceremony of visiting during its time. The goal of study is to find the greatest flow of visitors with create treatment of fuzzy by using the method of fuzzy dynamic programming style, though it used rank function to solve the fuzzy and Trigonometric functions, in order to know the time of increasing number of visitors .The results which have gotten by research that the Maximum flow of visitors on 24 Rajab are (131196, 94100, 46056), Throw( Morning, afternoon, evening) Where the number (46056) represents the Maximum flow for the morning period and so on the rest of the numbers, By using the grade function of the triangular triangulation function to handle the fog of the three periods of visitors per day
(Ie after processing the fog for (22-23-24 of Rajab month) shows that the Maximum flow of the processor is (91391) visitor at day 24), exactly the flow of visitors have increased from or fly intersection to Tarik intersection ,to 55 intersection, to 83 intersection, intersection of complex of teachers ,intersection of oil club, to al– binok, to selekh intersection, to al-nada mosque, to Antar intersection, to intersection of 14 Ramadan bridge, finally passing to kadhimen city .The number of visitors are (131196-51084), and the time of visiting between the noon of 23 of Rajab to night 24 of Rajab As shown in Figure (11).
Let M be an R-module, where R is a commutative ring with unity. A submodule N of M is called e-small (denoted by N e  M) if N + K = M, where K e  M implies K = M. We give many properties related with this type of submodules.
Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes.
The energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.
The present work investigates the effect of; superficial air velocities of: 1, 3, and 6 cm/s for two types of perforated distributor on hydrodynamic characteristic in a gas-liquid dispersion column of; air-water, and airaqueous-n-propanol solution. Bubble distribution, gas holdup, and power consumption are parameters take in consideration. Experimental work was carried out in perspex column of 8.5 cm inside diameter and 1.5 m height. Two types of bubble generator (perforated plate) were fixed at the bottom of the column; plate A (99 holes of 0.5 mm diameter and free area of 0.34%), plate B (20 holes of 1.5 mm diameter and free area of 0.62%). Photographic technique was used to measure the bubble parameters. The experimental results were
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.
In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
In the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThis research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show More