Given that the Crimean and Congo hemorrhagic fever is one of the deadly viral diseases that occur seasonally due to the activity of the carrier “tick,” studying and developing a mathematical model simulating this illness are crucial. Due to the delay in the disease’s incubation time in the sick individual, the paper involved the development of a mathematical model modeling the transmission of the disease from the carrier to humans and its spread among them. The major objective is to comprehend the dynamics of illness transmission so that it may be controlled, as well as how time delay affects this. The discussion of every one of the solution’s qualitative attributes is included. According to the established basic reproduction number, the stability analysis of the endemic equilibrium point and the disease-free equilibrium point is examined for the presence or absence of delay. Hopf bifurcation’s triggering circumstance is identified. Using the center manifold theorem and the normal form, the direction and stability of the bifurcating Hopf bifurcation are explored. The next step is sensitivity analysis, which explains the set of control settings that have an impact on how the system behaves. Finally, to further comprehend the model’s dynamical behavior and validate the discovered analytical conclusions, numerical simulation has been used.
Purpose: The study aims to investigate the extent to which material and non-material requirements are available in applying budgeting programs and performance in Iraqi governmental companies that are not aimed at achieving profits. whose activities are limited to providing services of public interest. This is done by studying the extent to which the requirements of each stage of preparing the programs and performance budget can be met. Theoretical framework: The process of evaluating financial performance is the main objective of all economic units, whether they are governmental or private economic units. Budgets contribute to the evaluation process by analyzing deviations in the application. The study includes an analytical pres
... Show MoreThe corrosion behavior of Titanium in a simulated saliva solution was improved by Nanotubular Oxide via electrochemical anodizing treatment using three electrodes cell potentiostat at 37°C. The anodization treatment was achieved in a non-aqueous electrolyte with the following composition: 200mL ethylene glycol containing 0.6g NH4F and 10 ml of deionized water and using different applied directed voltage at 10°C and constant time of anodizing (15 min.). The anodized titanium layer was examined using SEM, and AFM technique.
The results showed that increasing applied voltage resulted in formation titanium oxide nanotubes with higher corrosion resistance
A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
The latest events in Iraq and notably the fall of Mosul in the summer of 2014 have marked a turning point in The modern history of Iraq. Violent terrorist groups have overrun a vast area comprising of many towns in mid and northern Iraq causing many casualties and mass migration. Despite Iraq’s long history of pain and suffering the events of the second half of the year 2014 have been the most violent ever witnessed. From this point of view the researcher has tried to identify specifically in this time and place the effect these events have had on the Iraqi artist and to understand how the Iraqi artists depicted this violence in their works of art. The research comprises four parts; the first looked at the language used and the and pro
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreDepp and Heard's trial has reaped significant attention due to the domestic violence allegations directed towards each other. This paper sheds light on the repressed narrative beyond the mere words spoken aloud. It delves into an overlooked aspect, i.e., nonverbal communication. Previous studies focused on one or two categories of nonverbal communication. Therefore, the current study investigates the types and sub-types of nonverbal communication exhibited by both rivals within the courtroom setting. To examine the credibility and repressibility of nonverbal communication, the researchers have carefully watched (28) videos representing the whole trial's event. Some nonverbal communication was traced through the whole (28) videos fro
... Show MoreThis study aims to reveal the semiotic of “March of Return” cartoon in the Palestinian journalism, topics, Symbols and semantics that were covered.
This study is descriptive. It uses the survey method. Content analysis, and methodological comparison was also used.
The researcher chose an intentional sample of Palestine and Al-Hayat Al-Jadida newspapers for one year from March 30, 2018 to March 31, 2019, through a comprehensive inventory of all cartoons of the return marches during this period, which amounted to 59 cartoons.
The study has reached the following findings:
Newspapers cartoons focused on the topics of durability of the protester
... Show MoreIn this study, ultraviolet (UV), ozone techniques with hydrogen peroxide oxidant were used to treat the wastewater which is produced from South Baghdad Power Station using lab-scale system. From UV-H2O2 experiments, it was shown that the optimum exposure time was 80 min. At this time, the highest removal percentages of oil, COD, and TOC were 84.69 %, 56.33 % and 50 % respectively. Effect of pH on the contaminants removing was studied in the range of (2-12). The best oil, COD, and TOC removal percentages (69.38 %, 70 % and 52 %) using H2O2/UV were at pH=12. H2O2/ozone experiments exhibited better performance compared to
... Show MoreBackground: pregnancy as a systemic condition causes changes in the functioning of human body as a whole and specifically in the oral cavity and it also is considered as a stressful condition. These changes may favor the increase of oxidative stress. Aim: The aim of this study was to estimate the level of marker of oxidative stress (malondialdehyde) and antioxidant (uric acid) in saliva of pregnant compared to non-pregnant women and to assess the gingival health condition in both groups. Additionally, unstimulated salivary flow rate was determined in both groups. Subjects, materials and methods: The study group consisted of sixty pregnant women, they were divided into three equal groups according to trimester (20 pregnant women for each
... Show More