For any group G, we define G/H (read” G mod H”) to be the set of left cosets of H in G and this set forms a group under the operation (a)(bH) = abH. The character table of rational representations study to gain the K( SL(2,81)) and K( SL(2, 729)) in this work.
Globally, the COVID-19 pandemic’s development has presented significant societal and economic challenges. The carriers of COVID-19 transmission have also been identified as asymptomatic infected people. Yet, most epidemic models do not consider their impact when accounting for the disease’s indirect transmission. This study suggested and investigated a mathematical model replicating the spread of coronavirus disease among asymptomatic infected people. A study was conducted on every aspect of the system’s solution. The equilibrium points and the basic reproduction number were computed. The endemic equilibrium point and the disease-free equilibrium point had both undergone local stability analyses. A geometric technique was used
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreThis research studies the effect of particle packing density on sintering TiO2 microstructure. Sintering experiment was conducted on compacts involving of monodisperse spherical TiO2 particles. The experimental results are modeled using L2-Regression technique in studing the effect of two theoretical values of 55% and 69% of initial packing densities. The mathematical simulation shows that the lower values of density compacts sintered fast to theoretical density and this reflects that particle packing density improved densification rate because of the competing influence of grain growth at higher values of densities.
The study aims to build a water quality index that fits the Iraqi aquatic systems and reflects the environmental reality of Iraqi water. The developed Iraqi Water Quality Index (IQWQI) includes physical and chemical components. To build the IQWQI, Delphi method was used to communicate with local and global experts in water quality indices for their opinion regarding the best and most important parameter we can use in building the index and the established weight of each parameter. From the data obtained in this study, 70% were used for building the model and 30% for evaluating the model. Multiple scenarios were applied to the model inputs to study the effects of increasing parameters. The model was built 4 by 4 until it reached 17 parame
... Show MoreThe objective of the current research was to develop the posaconazole (PCZ) loaded NS into the carbopol 934 polymeric gel for prolonged drug release and improved topical delivery; seven different nanosponge formulations of PCZ were formulated using the emulsion solvent diffusion method using various amounts of polymer (ethylcellulose, EC). The aqueous and dispersed phases were prepared using polyvinyl alcohol (PVA) and dichloromethane. The prepared nanosponges (NS) were studied for particle size, structural appearance, and in vitro drug release. Furthermore, the selected formula was formulated as hydrogel and was evaluated for physical characteristics, drug content, and in-vitro drug release. Morphological studies revealed irregular
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreArtificial Neural Networks (ANN) is one of the important statistical methods that are widely used in a range of applications in various fields, which simulates the work of the human brain in terms of receiving a signal, processing data in a human cell and sending to the next cell. It is a system consisting of a number of modules (layers) linked together (input, hidden, output). A comparison was made between three types of neural networks (Feed Forward Neural Network (FFNN), Back propagation network (BPL), Recurrent Neural Network (RNN). he study found that the lowest false prediction rate was for the recurrentt network architecture and using the Data on graduate students at the College of Administration and Economics, Univer
... Show MoreABSTRACT
The research focuses on the key issue concerning the use of the best ways to test the financial stability in the banking sector, considering that financial stability cannot be achieved unless the financial sector in general and the banking sector in particular are able to perform its key role in addressing the economic and social development requirements, under the laws and regulations that control banking sector , as the only way that increases its ability to deal with any risks or negative effects experienced by banks and other financial institutions. The research goal is to evaluate the stability of the banking system in Iraq, through the use of a set of econometrics an
... Show More