This paper presents a linear fractional programming problem (LFPP) with rough interval coefficients (RICs) in the objective function. It shows that the LFPP with RICs in the objective function can be converted into a linear programming problem (LPP) with RICs by using the variable transformations. To solve this problem, we will make two LPP with interval coefficients (ICs). Next, those four LPPs can be constructed under these assumptions; the LPPs can be solved by the classical simplex method and used with MS Excel Solver. There is also argumentation about solving this type of linear fractional optimization programming problem. The derived theory can be applied to several numerical examples with its details, but we show only two examples for promising.
Back ground: Fibromyalgia syndrome (FMS) is a common chronic musculo-skeletal disorder resulting in chronic widespread pain impacting on quality life.
Objectives: To assess the relationship between FMS and knee osteoarthritis (KOA) and to evaluate the predictors of this relationship if present.
Patients and Methods: One hundred Iraqi KOA patients and 100 healthy controls were included in this cross-sectional study. Full history was taken and complete clinical examination was done for all patients. Baseline characteristics [age, sex, duration, body mass index (BMI), waist circumference, family history (Hx) of KOA, smoking history, and drug history.] were also documented. Laboratory analysis included complete blood count, erythrocyte
BACKGROUND: Preeclampsia (PE) is a possible etiology of obstetrical and neonatal complications which are increased in resource-limited settings and developing countries. AIM: We aimed to find out the prevalence of PE in Iraqi ladies and specific outcomes, including gestational weight gain (GWG), cesarean section (CS), preterm delivery (PD), and low birth weight (LBW). METHODS: All singleton pregnant women visiting our tertiary center for delivery were involved over 3 years. PE women were compared with non-PE ladies. Complete history and examination were done during pregnancy and after delivery by the attending obstetrician and neonatologist with full documentation in medical records. RESULTS: PE prevalence was 4.79
... Show MoreThe objective of this paper is, firstly, we study a new concept noted by algebra and discuss the properties of this concept. Secondly, we introduce a new concept related to the algebra such as smallest algebra. Thirdly, we introduce the notion of the restriction of algebra on a nonempty subset of and investigate some of its basic properties. Furthermore, we present the relationships between field, monotone class, field and algebra. Finally, we introduce the concept of measure relative to the algebra and prove that every measure relative to the is complete.
Background:
Background: Changes in the indication for splenectomy in hematology, especially in hematological malignancies, has been observed in the last 10 – 15 years. Yet splenectomy, as a diagnostic tool, is still an option in the management of isolated splenomegaly.
Objectives: to describe the outcome of diagnostic splenectomy in the management of 12 patients presenting with isolated splenomegaly.
Patients and methods: Between August 2005 and July2012, Twelve patients underwent splenectomy for diagnostic purposes in the hematology unit / Baghdad Teaching Hospital. Analysis of these patients was done with a median follow up of 16 months (6 months -4 years).
Results: The median age was 46 years (range 25-68). The median duration of sympt
Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
In this work, we consider a modification of the Lotka-Volterra food chain model of three species, each of them is growing logistically. We found that the model has eight equilibrium points, four of them always exist, while the rest exist under certain conditions. In terms of stability, we found that the system has five unstable equilibrium points, while the rest points are locally asymptotically stable under certain satisfying conditions. Finally, we provide an example to support the theoretical results.
The present work is concerned with the investigation of the behavior and ultimate capacity of axially loaded reinforced concrete columns in presence of transverse openings under axial load plus uniaxial bending. The experimental program includes testing of twenty reinforced concrete columns (150 × 150 × 700 mm) under concentric and eccentric load. Parameters considered include opening size, load eccentricity and influence of the direction of load eccentricity with respect to the longitudinal axis of the opening. Experimental results are discussed based on load – lateral mid height deflection curves, load – longitudinal shortening behavior, ultimate load and failure modes. It is found that when the direction of load
... Show MoreIn this paper, we study, in details the derivation of the variational formulation corresponding to functional with deviating arguments corresponding to movable boundaries. Natural or transversility conditions are also derived, as well as, the Eulers equation. Example has been taken to explain how to apply natural boundary conditions to find extremal of this functional.
Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR