An eco-epidemiological system incorporating a vertically transmitted infectious disease is proposed and investigated. Micheal-Mentence type of harvesting is utilized to study the harvesting effort imposed on the predator. All the properties of the solution of the system are discussed. The dynamical behaviour of the system, involving local stability, global stability, and local bifurcation, is investigated. The work is finalized with the numerical simulation to observe the global behaviour of the solution.
Let be a Banach space, be a nonempty closed convex subset of , and be self
nonexpansive map. The sequence generated by the iterative method
, where be a contractive mapping
and is a sequence in We generalize the mapping to non-sel -Strongly
Pseudocontractive .
An anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored.A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure.Pharmacological s
... Show MoreThe use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.
Construction projects are characterized as projects with multi phases and activities, complex, unique, and have many different parties and stakeholders. Risks could appear at one or more of the construction project stages and may affect the achievement of project objectives. Therefore, one of the key elements in the planning phase of any project is the risk management process (RMP). This study attempts to understand the terminology of risk in general, risk management, and response to risk in particular. This study is mainly a review of thirty-eight studies that have been published between 1997 and 2020 that demonstrate the importance of the crucial phase of risk response from the risk management process and its impact on
... Show MoreThe seizure epilepsy is risky because it happens randomly and leads to death in some cases. The standard epileptic seizures monitoring system involves video/EEG (electro-encephalography), which bothers the patient, as EEG electrodes are attached to the patient’s head.
Seriously, helping or alerting the patient before the seizure is one of the issue that attracts the researchers and designers attention. So that there are spectrums of portable seizure detection systems available in markets which are based on non-EEG signal.
The aim of this article is to provide a literature survey for the latest articles that cover many issues in the field of designing portable real-time seizure detection that includes the use of multiple
... Show MoreSummary:
OBJECTIVE Many associations have been found between specific HLA antigens and increased susceptibility to various diseases . So we tried to associate class I and class II antigens with acute lymphoblastic leukemia . We also demonstrate the presence of antibodies in serum of acute lymphoblastic leukemic patients against HLA class I.
DESIGN: Prospective study.
SETTING: Tissue typing and histocompatibility center at Al- Karamah Teaching Hospital. PATIENTS AND METHOD: 70 acute lymphoblastic leukemia patients from pediatric hospitals. HLA ( human leukocyte antigens) typing done for them by serological method and cross matching and blood grouping were also done for them.
RESULTS: there was significant difference between pa
There are many ways to communicate a story, one can tell it, sing it, act it, write it, film it and can draw it. Each form of storytelling has its unique characteristics that separate it from the other forms. These distinguishing characteristics of each form does not indicate the superiority of one form over the other, on the contrary, it indicates the human ability to be creative on many levels. As students of literature, only the written form of a story is taken into account. One reason for the negligence of other forms of storytelling might be that singing and filming a story is not related to literature. But there has been a form of storytelling that uses words along with pictures which eventually became a genre of novels called grap
... Show MoreThis research aims to invest qur›anic words referring to lie in media language. The researcher has chosen a set of qur›anic words functioning as «lie».
It is an attempt to review the media language which is used to make use of repetition of terms and templated which make it weak and ineffective language. The use of qur›anic texts and terms according to the semantic field for each topic will give this media language an opportunity for growth, development and stability.
This researcher identifies a number of words to study them in the light of their lexical meaning using the Dictionary of Language Standards by Ibn Fares as it focuses on the general meaning of the root language. He also uses the Dictionary of the Basis of Rhe
In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
Activity recognition (AR) is a new interesting and challenging research area with many applications (e.g. healthcare, security, and event detection). Basically, activity recognition (e.g. identifying user’s physical activity) is more likely to be considered as a classification problem. In this paper, a combination of 7 classification methods is employed and experimented on accelerometer data collected via smartphones, and compared for best performance. The dataset is collected from 59 individuals who performed 6 different activities (i.e. walk, jog, sit, stand, upstairs, and downstairs). The total number of dataset instances is 5418 with 46 labeled features. The results show that the proposed method of ensemble boost-based classif
... Show More