In this research a recent developed practical modeling technique is applied for the glucose regulation system identification. By using this technique a set of mathematical models is obtained instead of single one to compensate for the loss of information caused by the optimization technique in curve fitting algorithms, the diversity of members inside the single set is interpreted in term of restricted range of its parameters, also a diagnosis criteria is developed for detecting any disorder in the glucose regulation system by investigating the influence of variation of the parameters on the response of the system, this technique is applied in this research practically for 20 cases with association of National Center for Diabetes / Al Mustanseryia University.
There are many animal models for polycystic ovary (PCO); using exogenous testosterone enanthate is one of the methods of induction of these models. However, induction of insulin resistance should also be studied in the modeling technics. Therefore, the present study aims to investigate the expression of insulin receptor substrate (Irs)-2 mRNA in the liver tissue of rat PCO model. Nineteen Wistar rats were divided into three groups; (1) PCO modeling group (N =7) received daily 1.0 mg/100g testosterone enanthate solved in olive oil along with free access dextrose water 5%, (2) vehicle group (N =6), which handled like the PCO group, but did not receive testosterone enanthate, (3) control group (N =6) with standard care. Al
... Show MoreThis model is an extension to H.M.M.S and related developments models of a single product. These models will be converted to deal with Multiproduct for productive company. This model executed by computer programming technique to maximize profits
This paper is an attempt to help the manager of a manufactory to
plan for the next year by a scientific approach, to maximize the profit and آ provide optimal آ monthly quantities of آ production, آ inventory,
work-force, prices and sales. The computer programming helps us to execute that huge number of calculations.
Globally, the COVID-19 pandemic’s development has presented significant societal and economic challenges. The carriers of COVID-19 transmission have also been identified as asymptomatic infected people. Yet, most epidemic models do not consider their impact when accounting for the disease’s indirect transmission. This study suggested and investigated a mathematical model replicating the spread of coronavirus disease among asymptomatic infected people. A study was conducted on every aspect of the system’s solution. The equilibrium points and the basic reproduction number were computed. The endemic equilibrium point and the disease-free equilibrium point had both undergone local stability analyses. A geometric technique was used
... Show MoreThe last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.
The aim of this paper is to construct the analysis mathematical model for stream cipher cryptosystems in order to be cryptanalysis using the cryptanalysis tools based on plaintext attack (or part from it) or ciphertext only attack, choosing Brüer generator as study case of nonlinear stream cipher system.
The constructing process includes constructing the linear (or non-linear) equations system of the attacked nonlinear generator. The attacking of stream cipher cryptosystem means solving the equations system and that means finding the initial key values for each combined LFSR.
The Middle Cenomanian-Early Turonian Mishrif Formation includes important carbonate reservoirs in Iraq and some other surrounding countries due to their high reservoir quality and wide geological extension. The 2D models of this study for facies, effective porosity and water saturation indicate the vertical and lateral heterogeneity of the Mishrif Formation reservoir properties in the Majnoon oil field. Construction of 2D reservoir model of the Mishrif Formation to explain the distribution of facies and petrophysical properties (effective porosity and water saturation) by using RockWorks software. The increase of effective porosity is attributed to the presence of shoal facies.The high water saturation is attributed to the existence of rest
... Show MoreThis paper deals with the position of the UAE Civil Transactions Law No. 5 of 1985 on the harmful act and how it dealt with this subject, and we know that the direct historical source of the civil transactions law is the Jordanian Civil Code. Some texts are quoted literally from this law. The Jordanian civil law is clearly influenced by the jurisprudence of Hanafi and the jurisprudential jurisprudence, while the general orientation of the UAE legislator is to adopt the most appropriate solutions in the jurisprudence with the introduction of the Maliki and Hanbali and Hanafi and Shafei, in the absence of legislation to rule the matter, the authors of the law The United Arab Emirates have changed some of the texts passed on to the Jordania
... Show More