In this work, the fractional damped Burger's equation (FDBE) formula = 0,
Coronavirus disease (Covid-19) has threatened human life, so it has become necessary to study this disease from many aspects. This study aims to identify the nature of the effect of interdependence between these countries and the impact of each other on each other by designating these countries as heads for the proposed graph and measuring the distance between them using the ultrametric spanning tree. In this paper, a network of countries in the Middle East is described using the tools of graph theory.
The aim of the study is to examine the challenges of financing small and medium enterprises in Iraq and subsequently to proffer solutions to mitigate problems. These solutions are achieved by focusing on the role of accounting information on the financial projects in for example, hotel construction, and by providing the necessary accounting information for the concerned parties to finance these projects. In order to highlight the challenges associated with the funding of small and medium enterprises and the role of accounting information in reducing those challenges, a questionnaire was prepared. As the government authorities are the ones responsible for the accomplishment of these projects, a questionnaire form was distributed in the proje
... Show MoreCitrus fruits are one of the consumer agricultural products of the Iraqi citizen. It is rich in vitamins and usedin many food industries as well as medicines. Classifying the amount of production of citrus treesaccording to the producing governorates has been done to find a map that shows the production of citrustrees according to Iraqi governorates. A cluster analysis method was used according to the hierarchicalmethod. The results showed that Najaf and Qadisiyah are the most similar in citrus production, whileSaladin and Najaf were the two governorates with the furthest distance in proximity matrix. Diyalagovernorate was clustered in the first cluster within two, three, four or five of the clusters for classifyingIraqi governorates covere
... Show MoreAims of this research to determine asbestos fibers levels in surrounding air of some crowded sites of Baghdad city were monitored in summer 2020. Collection of samples was conducted by directing air flow to a mixed cellulose ester membrane filter mounted on an open‑faced filter holder using sniffer a low flow sampling pump, samples of air were collected from five studied areas selected in some heavy traffic areas of Baghdad city, (Al-Bayaa and Al-Shurta tunnel, Al-Jadriya, and Al-Meshin commercial complex, control), then analyzed to determine concentrations of asbestos fibers. Counting of asbestos on the filters was carried out through using both scanning electron microscope SEM and an energy dispersive X‑ray system EDS to count
... Show MoreFor a mathematical model the local bifurcation like pitchfork, transcritical and saddle node occurrence condition is defined in this paper. With the existing of toxicity and harvesting in predator and prey it consist of stage-structured. Near the positive equilibrium point of mathematical model on the Hopf bifurcation with particular emphasis it established. Near the equilibrium point E0 the transcritical bifurcation occurs it is described with analysis. And it shown that at equilibrium points E1 and E2 happened the occurrence of saddle-node bifurcation. At each point the pitch fork bifurcation occurrence is not happened.
A key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show MoreEnglish has for long been one of the most widely used media of communication globally, especially in the Malaysian universities. It has been termed as a Lingua Franca because it is shared with other languages which are considered first languages by different speakers. For this reason, English as a Lingua Franca (ELF) has attracted a number of researchers to investigate its variety via other languages in various communities. The objective of this paper is therefore to establish the strategies which are employing by the international students at the National University of Malaysia/ UniversitiKebangsaan Malaysia (UKM) as an example of one of the Malaysian universities; when they e
... Show MoreA Laced Reinforced Concrete (LRC) structural element comprises continuously inclined shear reinforcement in the form of lacing that connects the longitudinal reinforcements on both faces of the structural element. This study conducted a theoretical investigation of LRC deep beams to predict their behavior after exposure to fire and high temperatures. Four simply supported reinforced concrete beams of 1500 mm, 200 mm, and 240 mm length, width, and depth, respectively, were considered. The specimens were identical in terms of compressive strength ( 40 MPa) and steel reinforcement details. The same laced steel reinforcement ratio of 0.0035 was used. Three specimens were burned at variable durations and steady-state temperatures (one
... Show More