Some maps of the chaotic firefly algorithm were selected to select variables for data on blood diseases and blood vessels obtained from Nasiriyah General Hospital where the data were tested and tracking the distribution of Gamma and it was concluded that a Chebyshevmap method is more efficient than a Sinusoidal map method through mean square error criterion.
This paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p
... Show MoreWe use of multi-choice Goal Programming (MCGP), which is a developed model of Goal Programming where it is used in circumstances of the multiplicity and difference of goals when choosing between decision alternatives in cases of allocating resources, as it is a model that seeks to find the closest and best solutions to the specific values of the goals within the aspiration levels, as the first goal in the multi-choice goal programming model that is used to reduce the total cost of storage and shortage, while the other goal was to reduce the difference between the real demand that the hospitals need from the blood transfusion center and the units that already achieved. The case Iraqi Center
... Show MoreThis study proposes a mathematical approach and numerical experiment for a simple solution of cardiac blood flow to the heart's blood vessels. A mathematical model of human blood flow through arterial branches was studied and calculated using the Navier-Stokes partial differential equation with finite element analysis (FEA) approach. Furthermore, FEA is applied to the steady flow of two-dimensional viscous liquids through different geometries. The validity of the computational method is determined by comparing numerical experiments with the results of the analysis of different functions. Numerical analysis showed that the highest blood flow velocity of 1.22 cm/s occurred in the center of the vessel which tends to be laminar and is influe
... Show MoreThe cost of pile foundations is part of the super structure cost, and it became necessary to reduce this cost by studying the pile types then decision-making in the selection of the optimal pile type in terms of cost and time of production and quality .So The main objective of this study is to solve the time–cost–quality trade-off (TCQT) problem by finding an optimal pile type with the target of "minimizing" cost and time while "maximizing" quality. There are many types In the world of piles but in this paper, the researcher proposed five pile types, one of them is not a traditional, and developed a model for the problem and then employed particle swarm optimization (PSO) algorithm, as one of evolutionary algorithms with t
... Show MoreThe current study is aimed to identify personality types of the lecturers of Baghdad University as well as identify the prevailing types among the lecturers. In addition, the study aimed to identify the significant difference among personality types (The Enneagram) according to the variables of academic title and scientific major . One hundred and ninety four lecturers were involved in this study. In order to achieve the study's aims, the scale of (Baron& Wagele 1994) was used to measure the nine personality types (The Enneagram) that was translated by( Anwar Omar Ibrahim 2012). Some statistical analysis were used and the result demonstrated that Romantic types was found to be the most prevailing types among the lecturers of Baghdad
... Show MoreThis research includes problems that facing the philosophy of education in the variables of knowledge and Informatics society (techno _ social).
The problematic research included three questions:
1- What are the concepts and characterization related to the problematic of relationship between the philosophy of education and informatics variables (techno - social).
2-What kind of problems facing speech philosophy of education in the variables information (techno - social)
3 - What are the perceptions of educational proposed to address problematic philosophy of education in the scope of human (human nature) and (values and morals), in addition the research may explain the co
... Show MoreThis study is concerned with the comparison of the results of some tests of passing and dribbling of the basketball of tow different years between teams of chosen young players in Baghdad. Calculative methods were used namely (Arithmetic mean, Value digression and T.test for incompatible specimens). After careful calculative treatments, it has been that there were abstract or no abstract differences in the find results of chestpass, highdribble and cross-over dribble. The clubs were: (Al-Khark, Air defence, Police and Al-Adamiyah) each one separate from the other for the year (2000-2001). After all that many findings were reached such as the lack of objective valuation (periodical tests) between one sport season and the other. In the light
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More