The aim of this paper is to describe an epidemic model when two SI-Type of diseases are transmitted vertically as well as horizontally through one population. The population contains two subclasses: susceptible and infectious, while the infectious are divided into three subgroups: Those infected by AIDS disease, HCV disease, and by both diseases. A nonlinear mathematical model for AIDS and HCV diseases is Suggested and analyzed. Both local and global stability for each feasible equilibrium point are determined theoretically by using the stability theory of differential equations, Routh-Hurwitz and Gershgorin theorem. Moreover, the numerical simulation was carried out on the model parameters in order to determine their impact on the disease dynamics, and the results are displayed graphically and discussed.
Understanding the effects of fear, quadratic fixed effort harvesting, and predator-dependent refuge are essential topics in ecology. Accordingly, a modified Leslie–Gower prey–predator model incorporating these biological factors is mathematically modeled using the Beddington–DeAngelis type of functional response to describe the predation processes. The model’s qualitative features are investigated, including local equilibria stability, permanence, and global stability. Bifurcation analysis is carried out on the temporal model to identify local bifurcations such as transcritical, saddle-node, and Hopf bifurcation. A comprehensive numerical inquiry is carried out using MATLAB to verify the obtained theoretical findings and und
... Show MoreIn Incremental sheet metal forming process, one important step is to produce tool path, an
accurate tool path is one of the main challenge of incremental sheet metal forming
process. Various factors should be considered prior to generation of the tool path i.e.
mechanical properties of sheet metal, the holding mechanism, tool speed, feed rate and
tool size. In this work investigation studies have been carried out to find the different tool
path strategies to control the twist effect in the final product manufactured by single point
incremental sheet metal forming (SPIF), an adaptive tool path strategy was proposed and
examined for several Aluminum conical models. The comparison of the proposed tool path with t
This work investigates experimentally the effect of using a skirt with a square foundation of 100 mm width resting on dry gypseous soil (i.e., loose soil with 33% relative density), and subjected to an inclined load. Previous works did not study the use square skirted foundation rested on gypseous soil and subjected to inclined load. The investigated soil was brought from Tikrit city with 59% gypsum content. Standard physical and chemical tests on selected soil were carried out. Model laboratory tests were carried out to determine the effect of using a skirt with a square foundation on the load-settlement behavior of gypseous soil and subjected to inclined load with various Skirt depth (Ds) to foundation width (B) ratio
... Show MoreAbstract
The grey system model GM(1,1) is the model of the prediction of the time series and the basis of the grey theory. This research presents the methods for estimating parameters of the grey model GM(1,1) is the accumulative method (ACC), the exponential method (EXP), modified exponential method (Mod EXP) and the Particle Swarm Optimization method (PSO). These methods were compared based on the Mean square error (MSE) and the Mean Absolute percentage error (MAPE) as a basis comparator and the simulation method was adopted for the best of the four methods, The best method was obtained and then applied to real data. This data represents the consumption rate of two types of oils a he
... Show MoreAutorías: Suhair Meteab Munaf, Ali Abdulateef Ali, Mohannad Salman Dawood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 4, 2022. Artículo de Revista en Dialnet.
Start your abstract here the objective of this paper is to study the dynamical behaviour of an eco-epidemiological system. A prey-predator model involving infectious disease with refuge for prey population only, the (SI_) infectious disease is transmitted directly, within the prey species from external sources of the environment as well as, through direct contact between susceptible and infected individuals. Linear type of incidence rate is used to describe the transmission of infectious disease. While Holling type II of functional responses are adopted to describe the predation process of the susceptible and infected predator respectively. This model is represented mathematically by
Collapse of the vapor bubble condensing in an immiscible is investigated for n-pentane and n-hexane vapors condensing in cold water and n-pentane in two different compositions of glycerin- water mixture. The rise velocity and the drag coefficient of the two-phase bubble are measured.
The current research examines the employment of indicators of stereotypes and the dimensions of organizational clarification to achieve planned organizational behaviour on a sample of employees in a number of departments of the Faculties of Engineering, University of Kufa, for a sample of (122) teaching staff. This research proposes the use of positive indicators of stereotypes for both the organization and employees and their awareness of what they want to obtain and what should be done for both parties and the removal of organizational clarity represented by the functional dimension that explores to what degree the employee's understanding of the internal strategy of the organization and the strategic dimension that searches fo
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More