It is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreIn this research, an experimental study was conducted to high light the impact of the exterior shape of a cylindrical body on the forced and free convection heat transfer coefficients when the body is hold in the entrance of an air duct. The impact of changing the body location within the air duct and the air speed are also demonstrated. The cylinders were manufactured with circular, triangular and square sections of copper for its high thermal conductivity with appropriate dimensions, while maintaining the surface area of all shapes to be the same. Each cylinder was heated to a certain temperature and put inside the duct at certain locations. The temperature of the cylinder was then monitored. The heat transfer coefficient were then cal
... Show MoreBACKGROUND: Montelukast (Singulair) is a cysteinyl leukotriene receptor antagonist, used for the maintenance treatment of asthma and to relieve symptoms of seasonal allergic rhinitis and asthma, also used for exercise-induced bronchospasm. AIM: This study was performed to determine the prevalence of Montelukast use as an add-on therapy among Iraqi asthmatic patients on treatment. Comparing the effectiveness of regimens with and without montelukast. METHODS: This descriptive cross-sectional study was carried out on 73 Iraqi asthmatic patients on treatment of both sexes with age range (18-60) years old, attending Al-Kindy Teaching Hospital and Al-Zahraa Centre of Asthma and Allergy, Baghdad, for the period between February
... Show MoreBACKGROUND: Montelukast (Singulair) is a cysteinyl leukotriene receptor antagonist, used for the maintenance treatment of asthma and to relieve symptoms of seasonal allergic rhinitis and asthma, also used for exercise-induced bronchospasm. AIM: This study was performed to determine the prevalence of Montelukast use as an add-on therapy among Iraqi asthmatic patients on treatment. Comparing the effectiveness of regimens with and without montelukast. METHODS: This descriptive cross-sectional study was carried out on 73 Iraqi asthmatic patients on treatment of both sexes with age range (18-60) years old, attending Al-Kindy Teaching Hospital and Al-Zahraa Centre of Asthma and Allergy, Baghdad, for the period between February
... Show MoreThe marine collagens are biocompatible and biodegradable materials that are considered as a biomimetic approach for tissue regeneration. This study evaluated the effect of daily consumption of marine collagen supplement drink on enamel white spot lesions (WSLs), comparing the results against Regenerate system and Sylc air abrasion methods. Fifty human enamel slabs were allocated into five groups (n = 10 per group): non-treated (sound); non-treated (WSLs, 8% methylcellulose gel with 0.1 M lactic acid (pH 4.6) at 37 °C for 21 days); and three treated surfaces with marine collagen; Regenerate system; and Sylc air abrasion. The treatment lasted for 28 days followed by four weeks’ storage in artificial saliva (pH = 7.0, 37 °C). Evalu
... Show MoreExperiments were conducted to study the behavior of the solid particles (proppant) inside the hydraulic fracture during the formation stimulation, and study the effect of the proppant concentration on the hydraulic fracturing process, which lead to bridge and screen-out conditions inside the fractures across the fracture width that restricts fracturing fluid to flow into the hydraulic fracture. The research also studies the effect of the ratio between the fracture size and the average particles diameter “proppant", on fracture bridging. In this study two ratios were considered β= 2 and 3 ,where β=Dt / Dp where: Dt= hydraulic fracture size (width) and Dp=Average particles diameter.
This work pr
... Show MoreAbstract
The study aims to find out the impact of expectations and perceptions in determining the position of the customer service quality received by him. Represent the expectations and perceptions customer’s key of service quality determinants. The customer's requirements and needs main pivot, who must be built all events and activities and efforts of service organizations, including the hotel and organizations that operate in an environment known as highly competitive , intensification and complexity of the conditions set by the customer and increasing day after day. The study sample of three Luxury hotels in Kurdistan region of Iraq a model. The use of service quality m
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show More