Preferred Language
Articles
/
jeasiq-656
Constructing fuzzy linear programming model with practical application
...Show More Authors

This paper deals with constructing a model of fuzzy linear programming with application on fuels product of Dura- refinery , which consist of seven products that have direct effect ondaily consumption . After Building the model which consist of objective function represents the selling prices ofthe products and fuzzy productions constraints and fuzzy demand constraints addition to production requirements constraints , we used program of ( WIN QSB )  to find the optimal solution

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Determining ACE-2 Level and Some Relevant Biochemical Parameters and studying the effect of Gender in Iraqi Diabetic Patients with Glomeruli and Renal Tubules Fibrosis as Early Prediction Marker
...Show More Authors

     Diabetic kidney disease is an illness of the glomerulus that interferes with the glomerular filtration barrier (GFB), which is worked to enable kidney to selective purification of water and solutes in addition to limiting the movement of large macromolecules such as albumin. In the glomerular endothelium, mesangial cells, foot cells, and the brush border of the proximal tubules, ACE-2 is expressed and that the kidneys represent the highest-expressing region of this enzyme. Thus, the current study aimed to evaluate ACE-2 level in this case compared to healthy condition. The study Conducted with 120 male and female ranging in age (30-65) years old. Ninety patients with type 2 diabetes subdivided into three groups on the basis of A

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Tracked Robot Control with Hand Gesture Based on MediaPipe
...Show More Authors

Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sun May 10 2020
Journal Name
Baghdad Science Journal
Lack of Association between LCS6 Variant in KRAS Gene with the Occurrence of Breast Tumors in Iraqi Women
...Show More Authors

Breast cancer is the most commonly diagnosed cancer and remains one of the main reasons of cancer-related mortality in women worldwide. KRAS variant rs61764370 (T>G) is associated with an increased risk of occurrence of many cancers, Here The case-control study was accomplished on 135 women including 45 women with breast cancer patients, 45 women with benign breast lesions and 45 healthy women to analyze the association of KRAS variant rs (61764370 T>G) with breast cancer. LCS 6 variant in KRAS gene was amplified by using specific primers, then genotype was detected after sequencing the PCR products. The results showed that the genotype and allele frequency of TT and GT allele of  KRAS

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Estimation Mean Wind Speed in Iraq By Using Parametric And Nonparametric Linear Mixed Models
...Show More Authors

In this research, the one of the most important model and widely used in many and applications is linear mixed model, which widely used to analysis the longitudinal data that characterized by the repeated measures form .where estimating linear mixed model by using two methods (parametric and nonparametric) and used to estimate the conditional mean and marginal mean in linear mixed model ,A comparison between number of models is made to get the best model that will represent the mean wind speed in Iraq.The application is concerned with 8 meteorological stations in Iraq that we selected randomly and   then we take a monthly data about wind speed over ten years Then average it over each month in corresponding year, so we g

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
Journal Of Educational And Psychological Researches
أثر أنموذج وودز في تصحيح المفاهيم الجغرافية ذات الفهم الخاطئ لدى طلاب الصف الأول المتوسط
...Show More Authors

The present study aims at knowing the effect of Woods' model in correcting the geographical missUnderstanding for first stage students. In order to realize the objective of this study, the researcher used an experimental design with partial adjustment which is experimental group with another control group. The research is confined to the first four chapters of the boon of the principles of geography to be studied for the first stage in the academic year (2010/2011) in Iraq. The researcher chooses purposely the chose a staple form the first stage in Hay Al-Jama'a School for boys, in order to apply the experiment. The total number of the sample was (60) students who were distributed randomly as (30)per group. The researcher matched two gro

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 15 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Evaluation of EDI Software Application
...Show More Authors

The primary objective of this research is to determine the best EDI
software application that meets the users' requirements, and to show
the functionality potentially presented in any software of electronic
data interchange (EDI) system. Also, in this paper, will be addressed
issues relating to integration EDI system into business process, and
the issues regarding the performance of EDI application will also be
discussed

View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Advances In Intelligent Systems And Computing
Optimal Prediction Using Artificial Intelligence Application
...Show More Authors

View Publication
Scopus (12)
Crossref (11)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
International Journal Of Engineering In Computer Science
Human biometric identification: Application and evaluation
...Show More Authors

View Publication
Crossref
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF