The aims of this paper is investigating the spread of AIDS both within-host, through the contact between healthy cells with free virus inside the body, and between-host, through sexual contact among individuals and external sources of infectious. The outbreak of AIDS is described by a mathematical model consisting of two stages. The first stage describes the within-host spread of AIDS and is represented by the first three equations. While the second stage describes the between-host spread of AIDS and represented by the last four equations. The existence, uniqueness and boundedness of the solution of the model are discussed and all possible equilibrium points are determined. The local asymptotic stability (LAS) of the model is studied, wh
... Show MoreThis study was carried out to study effect of magnetic water ( M0 and M) and different concentrations of coconut extract in Fragaria x ananassa (Duch) C.V Festival. The results showed significant differences in the plants treated with magnetic water ( 0.12 Tesla) and different concentrations of coconut extract C1 (0%), C2 (2.5%), C3 (5%), C4 (7.5%) and C5 (10%) in vegetative parameters as in leaf area and chlorophyll in treatment M0C3 was (53.72 Dcm2, 50.00), respectively, highest leaf number and plant dry weight in MC4 (12.77,14.22 gm), respectively. Results recorded significant differences in fruit parameters such as weight in MC1 (18.97 gm). The maximum fruit number was in MC3 (110), the greatest fruit size was in MC4 (15.78 cm3) and the
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreIn this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.
The experiment was carried out in the spring season of 2017 in the open fields of the College of Agricultural Engineering Sciences/University of Baghdad/Al-Jadriya camps in order to improve the growth and yield of potato plants resulting from the cultivation of true potato seeds of the hybrid BSS-295 by spraying with two organic nutrients. The experiment included two factors: First one was spraying with Megafol nutrient at concentrations 0, 1, 2 and 4 ml l-1 and the second was spraying with Algazone nutrient at concentrations 0, 1.5 and 3 ml l-1, the experiment was applied according to the complete randomized block design with three replicatio
In this paper, the delay integral equations in population growth will be described,discussed , studied and transfered this model to integro-differential equation. At last,we will solve this problem by using variational approach.
Alpha shape theory for 3D visualization and volumetric measurement of brain tumor progression using magnetic resonance images
The main aim of this paper is to introduce the relationship between the topic of coding theory and the projective plane of order three. The maximum value of size of code over finite field of order three and an incidence matrix with the parameters, (length of code), (minimum distance of code) and (error-correcting of code ) have been constructed. Some examples and theorems have been given.