This Paper aims to plan the production of the electrical distribution converter (400 KV/11) for one month at Diyala Public Company and with more than one goal for the decision-maker in a fuzzy environment. The fuzzy demand was forecasting using the fuzzy time series model. The fuzzy lead time for raw materials involved in the production of the electrical distribution converter (400 KV/11) was addressed using the fuzzy inference matrix through the application of the matrix in Matlab, and since the decision-maker has more than one goal, so a mathematical model of goal programming was create, which aims to achieve two goals, the first is to reduce the total production costs of the electrical distribution converter (400 KV/11) and th
... Show MoreThe pillars of sustainable development are representing the interface between environmental, economic, and social sustainability. Sustainable development is a method of planning and managing construction projects to reduce the effect of the construction process on the environment so that there is a balance between environmental capabilities and the human needs of present and future generations. Usually, Environmental sustainability is most important and effective in construction projects. The environment suffers from significant negative impacts as a result of the implementation of construction projects; therefore, this study aims to identify the effecting factors on environmentally sustainable development. The methodology of this s
... Show MoreAd-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one prot
... Show MoreIn this work laser detection and tracking system (LDTS) is designed and implemented using a fuzzy logic controller (FLC). A 5 mW He-Ne laser system and an array of nine PN photodiodes are used in the detection system. The FLC is simulated using MATLAB package and the result is stored in a lock up table to use it in the real time operation of the system. The results give a good system response in the target detection and tracking in the real time operation.
The aimed of the research was recognize the Big five personality factors and Academic procrastination among Baghdad university students, recognized differences between the gender according to Big five personality factors and Academic procrastination , to recognized differences between specialization (scientific, human), and to recognize the relationship Between the variables of the research, and the extend of contribution Big five personality factors in Academic procrastination , to achieve these aims , Adopt scale to measure the Big five personality factors for (John Danahue & Kentle) , As we as the preparation of scale Based on An amber of previous scales to measure Academic procrastination, After processing the data st
... Show MoreThe current study aims at identifying:
1-The intellectual stress of counselors according to gender variable (male, female ).
2-The five major factors of the Counselor's Personality.
3- The relationship between intellectual stress and the five major factors of the councilors' personality and according to gender variable (male, female ).
4-The significant differences in the relationship between intellectual stress and the five major factors of the councilors' personality and according to gender variable (male, female ).
The sample of the study includes (260) counselors (130 male
... Show MoreBackground: Several studies linked the development of steroid-resistant nephrotic syndrome (SRNS) to genetic variations in the multidrug resistance 1 (MDR1) gene, though a disparity in findings was underlined among children with different ethnic origins. Objective: This study examined the relationship between MDR1 variants (rs2032582 and rs2032583) and the risk of developing SRNS in Iraqi patients with idiopathic nephrotic syndrome (INS). Methods: This case-control study included children with steroid-sensitive INS (SSNS; n=30) and SRNS (n=30) from the Babylon Hospital for Maternity and Pediatrics. Sanger sequencing was used to determine the participants’ genotypes. Results: The rs2032582 genotypes and alleles were not associated
... Show MoreThe aim of the present research is to study different protein fractions in sera of children and adolescent with β –thalassemia major and minor and to compare the results with that of healthy control.One hundred fifty children and adolescents were enrolled in this study,including 50 patients with β- thalassemia major , 50 patients with β- thalassemia minor as pathological control group and another apparently 50 healthy individuals as a control group. The age of all studied groups ranged from (4-18)years.Total protein, albumin and immunoglobulins were estimated in sera of all subjects. A Significant decrease was found in the total protein and albumin&nb
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More