Preferred Language
Articles
/
FRcweo0BVTCNdQwCABUc
Dynamics Analysis of a Delayed Crimean-Congo Hemorrhagic Fever Virus Model in Humans
...Show More Authors

Given that the Crimean and Congo hemorrhagic fever is one of the deadly viral diseases that occur seasonally due to the activity of the carrier “tick,” studying and developing a mathematical model simulating this illness are crucial. Due to the delay in the disease’s incubation time in the sick individual, the paper involved the development of a mathematical model modeling the transmission of the disease from the carrier to humans and its spread among them. The major objective is to comprehend the dynamics of illness transmission so that it may be controlled, as well as how time delay affects this. The discussion of every one of the solution’s qualitative attributes is included. According to the established basic reproduction number, the stability analysis of the endemic equilibrium point and the disease-free equilibrium point is examined for the presence or absence of delay. Hopf bifurcation’s triggering circumstance is identified. Using the center manifold theorem and the normal form, the direction and stability of the bifurcating Hopf bifurcation are explored. The next step is sensitivity analysis, which explains the set of control settings that have an impact on how the system behaves. Finally, to further comprehend the model’s dynamical behavior and validate the discovered analytical conclusions, numerical simulation has been used.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (71)
Crossref (63)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Potentiometric Analysis of Samarium Ion in Aqueous Solution Employing Selective Electrode Based on Crown Ethers - Samarium Picrate Complexes in a PVC Membrane
...Show More Authors

Samarium  ion selective  electrodes  we1·e  construct.ed  and  prepared

then  tested as  probefor  Samarium  ion detection  and determination  in different aqueous solutions.

The sensitive membrane is made of  PVC which contains Samarium

picrate complexed with either 18-crown-6 or 15-crown-5 ethers as active species.

Different  plasticizers:  phthalates  (DBPH),  phosphates  (DBP)  and

phosphonates  (DOPP) were incorporated into the membranes as solvent

mediators.

Every   membrane   was   evaluated   practically   following  &n

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Annals Of Burns And Fire Disasters
ANALYSIS OF BLOOD CULTURE RESULTS OF BURN SEPTICAEMIA PATIENTS OVER A PERIOD OF NINE YEARS IN THE BAGHDAD BURN MEDICAL CENTRE
...Show More Authors

Burn is one of the most devastating traumas that someone can encounter in their life. Burn wound sepsis is still the leading cause of death in burned patients. Appropriate knowledge of the causative pathogen in burn sepsis is important for successful patient management and for the reduction of the incidence of antibiotic resistance. A retrospective study was conducted between 2010 and 2018 at the Burn Specialty Hospital in Baghdad.Atotal of 320 blood culture samples were obtained from patients with sepsis orsuspected of having sepsis. Patient age ranged between 9 months to 70 years old, with a mean total burn surface area of 45.26%. The most common microorganisms isolated from those patients who had sepsis or suspicion of sepsis were Klebsi

... Show More
Scopus (1)
Scopus
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Future of Mathematical Modelling: A Review of COVID-19 Infected Cases Using S-I-R Model
...Show More Authors

The spread of novel coronavirus disease (COVID-19) has resulted in chaos around the globe. The infected cases are still increasing, with many countries still showing a trend of growing daily cases. To forecast the trend of active cases, a mathematical model, namely the SIR model was used, to visualize the spread of COVID-19. For this article, the forecast of the spread of the virus in Malaysia has been made, assuming that all Malaysian will eventually be susceptible. With no vaccine and antiviral drug currently developed, the visualization of how the peak of infection (namely flattening the curve) can be reduced to minimize the effect of COVID-19 disease. For Malaysians, let’s ensure to follow the rules and obey the SOP to lower the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
A Stochastic Differential Equations Model for the Spread of Coronavirus COVID-19): The Case of Iraq
...Show More Authors

In this paper, we model the spread of coronavirus (COVID -19) by introducing stochasticity into the deterministic differential equation susceptible  -infected-recovered (SIR model). The stochastic SIR dynamics are expressed using Itô's formula. We then prove that this stochastic SIR has a unique global positive solution I(t).The main aim of this article is to study the spread of coronavirus COVID-19 in Iraq from 13/8/2020 to 13/9/2020. Our results provide a new insight into this issue, showing that the introduction of stochastic noise into the  deterministic model for the spread of COVID-19 can cause the disease to die out, in scenarios where deterministic models predict disease persistence. These results were also clearly ill

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (5)
Scopus Crossref
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The design of a proposed model for the application of the insurance policy for medical errors
...Show More Authors

The aim of this study is to design a proposed model for a document to insure the mistakes of the medical profession in estimating the compensation for medical errors. The medical profession is an honest profession aimed primarily at serving human and human beings. In this case, the doctor may be subject to error and error , And the research has adopted the descriptive approach and the research reached several conclusions, the most prominent of which is no one to bear the responsibility of medical error, although the responsibility shared and the doctor contributes to them, doctors do not deal with patients according to their educational level and cultural and there are some doctors do not inform patients The absence of a document to insu

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Al-adab Journal
The Study and Analysis Grammatical of verbal sentence a fragment of "Zurita" (Leopoldo alas Clarín)
...Show More Authors

This article deals with the study of theories about verbal periphrasis as a grammatical construction; the aim of this point it offers good and valid guidelines to improve the linguistic description. The interest in the subject comes from its importance in the process of language teaching for the students of Spanish and to clarify this type of curriculum of this research we analyzed a literary text. From "Zurita"

View Publication
Crossref
Publication Date
Wed Jun 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Analysis of a Fixed Bed Absorber Used for the Removal of Pollutants from Water
...Show More Authors

View Publication Preview PDF