The aims of this paper is investigating the spread of AIDS both within-host, through the contact between healthy cells with free virus inside the body, and between-host, through sexual contact among individuals and external sources of infectious. The outbreak of AIDS is described by a mathematical model consisting of two stages. The first stage describes the within-host spread of AIDS and is represented by the first three equations. While the second stage describes the between-host spread of AIDS and represented by the last four equations. The existence, uniqueness and boundedness of the solution of the model are discussed and all possible equilibrium points are determined. The local asymptotic stability (LAS) of the model is studied, while suitable Lyapunov functions are used to investigate the global asymptotic stability (GAS) of the model. Optimal control strategy is used to control the outbreak of AIDS. Finally, a numerical simulation is carried out to confirm the analytical results and understand the effects of varying the parameters on the spread of disease.
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreAs a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree
... Show MoreThis paper is intended to apply data mining techniques for real Iraqi biochemical dataset to discover hidden patterns within tests relationships. It is worth noting that preprocessing steps take remarkable efforts to handle this type of data, since it is pure data set with so many null values reaching a ratio of 94.8%, then it becomes 0% after achieving these steps. However, in order to apply Classification And Regression Tree (CART) algorithm, several tests were assumed as classes, because of the dataset was unlabeled. Which then enabled discovery of patterns of tests relationships, that consequently, extends its impact on patients’ health, since it will assist in determining test values by performing only relevant
... Show MoreIn the present paper, by making use of the new generalized operator, some results of third order differential subordination and differential superordination consequence for analytic functions are obtained. Also, some sandwich-type theorems are presented.
Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f
... Show MoreThe aim of this paper is to propose a reliable iterative method for resolving many types of Volterra - Fredholm Integro - Differential Equations of the second kind with initial conditions. The series solutions of the problems under consideration are obtained by means of the iterative method. Four various problems are resolved with high accuracy to make evident the enforcement of the iterative method on such type of integro differential equations. Results were compared with the exact solution which exhibits that this technique was compatible with the right solutions, simple, effective and easy for solving such problems. To evaluate the results in an iterative process the MATLAB is used as a math program for the calculations.
In this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint
... Show MoreBackground: Data on SARS-CoV-2 from developing countries is not entirely accurate, demanding incorporating digital epidemiology data on the pandemic.
Objectives: To reconcile non-Bayesian models and artificial intelligence connected with digital and classical (non-digital) epidemiological data on SARS-CoV-2 pandemic in Iraq.
Results: Baghdad and Sulaymaniyah represented statistical outliers in connection with daily cases and recoveries, and daily deaths, respectively. Multivariate tests and neural networks detected a predictor effect of deaths, recoveries, and daily cases on web searches concerning two search terms, "كورونا" and "Coronavirus" (Pillai's Trace val
In the present study, gold nanoparticles (AuNPs) were prepared using a simple low cost method synthesized cold plasma at different exposure time . The nanoparticles were characterized using UV-Visible spectra, X-ray diffraction (XRD). The prepared AuNPs showed surface Plasmon resonance centered at 530, 540,and 533 nm. The XRD pattern showed that the strong intense peaks indicate crystalline nature and face centered cubic structure of gold nanoparticles for all samples were prepared .The average crystallite size of the AuNPs was 20-40 nm. Morphology of the AuNPs were carried out using FESEM. Observations show that the AuNPs synthesized we well dispersed with and particle sizes ranging from 9 to 31 nm with spherical shapes which are cle
... Show MoreThe process of controlling a Flexible Joint Robot Manipulator (FJRM) requires additional sensors for measuring the state variables of flexible joints. Therefore, taking the elasticity into account adds a lot of complexity as all the additional sensors must be taken into account during the control process. This paper proposes a nonlinear observer that controls FJRM, without requiring equipment sensors for measuring the states. The nonlinear state equations are derived in detail for the FJRM where nonlinearity, of order three, is considered. The Takagi–Sugeno Fuzzy Model (T-SFM) technique is applied to linearize the FJRM system. The Luenberger observer is designed to estimate the unmeasured states using error correction. The develop
... Show More