The spread of novel coronavirus disease (COVID-19) has resulted in chaos around the globe. The infected cases are still increasing, with many countries still showing a trend of growing daily cases. To forecast the trend of active cases, a mathematical model, namely the SIR model was used, to visualize the spread of COVID-19. For this article, the forecast of the spread of the virus in Malaysia has been made, assuming that all Malaysian will eventually be susceptible. With no vaccine and antiviral drug currently developed, the visualization of how the peak of infection (namely flattening the curve) can be reduced to minimize the effect of COVID-19 disease. For Malaysians, let’s ensure to follow the rules and obey the SOP to lower the R0 value from time to time, hoping that the virus will vanish one day.
The gas sensing properties of Co3O4and Co3O4:Y nano structures were investigated. The films were synthesized using the hydrothermal method on a seeded layer. The XRD, SEM analysis and gas sensing properties were investigated for Co3O4and Co3O4:Y thin films. XRD analysis shows that all films are polycrystalline in nature, having a cubic structure, and the crystallite size is (11.7)nm for cobalt oxide and (9.3)nm for the Co3O4:10%Y. The SEM analysis of thin films obviously indicates that Co3O4possesses a nanosphere-like structure and a flower-like structure for Co3O4:Y.The sensitivity, response time and recovery time to a H2S reducing gas were tested at different operating
... Show MoreThe current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances. From the diversity of Big Data variables comes many challenges that can be interesting to the researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter
... Show MoreThis study aims to estimate the accuracy of digital elevation models (DEM) which are created with exploitation of open source Google Earth data and comparing with the widely available DEM datasets, Shuttle Radar Topography Mission (SRTM), version 3, and Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. The GPS technique is used in this study to produce digital elevation raster with a high level of accuracy, as reference raster, compared to the DEM datasets. Baghdad University, Al Jadriya campus, is selected as a study area. Besides, 151 reference points were created within the study area to evaluate the results based on the values of RMS.Furthermore, th
... Show MoreThis study aimed to identify the employment of the social networking platform «Twitter» in the 2016 presidential campaign led by the Republican candidate, Donald Trump; and analyse his tweets through his personal account on «Twitter» for the period from: 10/ 8/2016 to: 11/ 8/2016 which represents the last month of the election campaign.
The study belongs to the type of descriptive studies using the analytical method through an analysis index that includes sub-categories and other secondary categories. The research has adopted the ordinary unit of information material (tweet) as an analysis unit for this purpose.
... Show MoreThe objective of present study was to compare of several methods for estimating the degree of heritability and calculating the number of genes using generation mean analysis of maize (
The research aims to analysis of the current financial crisis in Iraq through knowing its causes and then propose some solutions that help in remedy the crisis and that on the level of expenditures and revenues, and has been relying on the Federal general budget law of the Republic of Iraq for the fiscal year 2016 to obtain the necessary data in respect of the current expenditures and revenues which necessary to achieve the objective of the research , and through the research results has been reached to a set of conclusions which the most important of them that causes of the current financial crisis in Iraq , mainly belonging to increased expenditures and especially the current ones and the lack of revenues , especially non-oil o
... Show MoreThis research means a study (the impact of the Arab-Islamic environment on contemporary painting, the artist Abd al-Rahman al-Suleiman as a model). The research falls into two axes: the first: the theoretical axis, and the second: the applied axis. The first axis dealt with an introduction that contained: (the research problem, its importance, its goal, its limits, and the definition of terms). This research aims to uncover (the impact of the Arab-Islamic environment on contemporary painting, and the artist Suleiman was a model). And the research limits spatially: Saudi Arabia, and temporally: 2010-2014. This theme included two topics: The first: the characteristics of the Saudi environment and its impact on art. The second: the s
... Show MoreThe research tagged with the controversy of aesthetic interpretation between the sculptures and their titles in contemporary Iraqi sculpture, “Exhibition of Experiments in Contemporary Iraqi Sculpture as a Model”, and it is one of the new research that contributes to strengthening the critical path in the Iraqi fine movement, as the first chapter dealt with the research problem stemming from the question: What is the impact of the aesthetic hermeneutic controversy between the title and the title in contemporary Iraqi sculpture?, and do the titles of the sculptural works help to understand or enhance their contents?, The research objective included: To identify the controversy of the aesthetic interpretation of sculptures and their ti
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show More