This research aims to solve the nonlinear model formulated in a system of differential equations with an initial value problem (IVP) represented in COVID-19 mathematical epidemiology model as an application using new approach: Approximate Shrunken are proposed to solve such model under investigation, which combines classic numerical method and numerical simulation techniques in an effective statistical form which is shrunken estimation formula. Two numerical simulation methods are used firstly to solve this model: Mean Monte Carlo Runge-Kutta and Mean Latin Hypercube Runge-Kutta Methods. Then two approximate simulation methods are proposed to solve the current study. The results of the proposed approximate shrunken methods and the numerical simulation methods are compared with the standard results of the numerical method which is Runge-Kutta 4th Method from the year 2021 to 2025, using the absolute error, through comparison, it becomes clear that the approximate proposed solution is better and closer to the standard solution than the solutions of other methods that used to solve this system. The results are tabulated and represented graphically, as well as a discussion to prove the efficiency of the proposed methods.
Lead remediation was achieved using simple cost, effective and eco-friendly way from industrial wastewater. Phragmitesaustralis (P.a) (Iraqi plant), was used as anovel biomaterial to remove lead ions from synthesized waste water. Different parameters which affected on adsorption processes were investigated like adsorbent dose, pH, contact time, and adsorbent particle size, to reach the optimized conditions (maximum adsorption). The adsorption of Pb (?) on (P.a) involved fast and slow process as a mechanism steps according to obey two theoretical adsorption isotherms; Langmuir and Freundlich. The thermos dynamic adsorption parameters were evaluated also. The (?H) obtained positive value that meanes adsorption of lead ions was an endothermic
... Show MoreThis paper proposes a new algorithm (F2SE) and algorithm (Alg(n – 1)) for solving the
two-machine flow shop problem with the objective of minimizing total earliness. This
complexity result leads us to use an enumeration solution approach for the algorithm (F2SE)
and (DM) is more effective than algorithm Alg( n – 1) to obtain approximate solution.
Lead remediation was achieved using simple cost, effective and eco-friendly way from industrial wastewater. Phragmitesaustralis (P.a) (Iraqi plant), was used as anovel biomaterial to remove lead ions from synthesized waste water. Different parameters which affected on adsorption processes were investigated like adsorbent dose, pH, contact time, and adsorbent particle size, to reach the optimized conditions (maximum adsorption). The adsorption of Pb (?) on (P.a) involved fast and slow process as a mechanism steps according to obey two theoretical adsorption isotherms; Langmuir and Freundlich. The thermos dynamic adsorption parameters were evaluated also. The (?H) obtained positive value that meanes adsorption of lead ions was an endothermic
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreThis study aims to demonstrate the role of artificial intelligence and metaverse techniques, mainly logistical Regression, in reducing earnings management in Iraqi private banks. Synthetic intelligence approaches have shown the capability to detect irregularities in financial statements and mitigate the practice of earnings management. In contrast, many privately owned banks in Iraq historically relied on manual processes involving pen and paper for recording and posting financial information in their accounting records. However, the banking sector in Iraq has undergone technological advancements, leading to the Automation of most banking operations. Conventional audit techniques have become outdated due to factors such as the accuracy of d
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreAbstract
This study aims at clarifying the current performance appraisal system in government units and the extent to which they contribute to the development of the performance of these units by evaluating and measuring the performance of these units on an ongoing basis to subject their services to an assessment and measurement process in order to improve the efficiency of these units to reach their objectives efficiently and effectively. (Iraqi hospitals) by trying to determine the possibility of the government accounting system in the process of evaluating performance, through the comparison of financial performance for successive years and different hospitals using the financial and non-financial model of the evaluati
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More