In this paper a mathematical model that analytically as well as numerically
the flow of infection disease in a population is proposed and studied. It is
assumed that the disease divided the population into five classes: immature
susceptible individuals (S1) , mature individuals (S2 ) , infectious individual
(I ), removal individuals (R) and vaccine population (V) . The existence,
uniqueness and boundedness of the solution of the model are discussed. The
local and global stability of the model is studied. Finally the global dynamics of
the proposed model is studied numerically.
This study aimed at revealing the degree of availability of standards of word problems in mathematics books for the first three grades of the basic stage in Palestine. For this purpose, the researcher prepared an analysis tool and a list of criteria consisting of two areas: linguistic formulation and mathematical content. Every area had seven items. The results of the study showed that the third-grade mathematics book has the highest degree of availability of the standards with 85.75%, and then came the second-grade mathematics book with 83.12%. Finally, the first-grade mathematics book came with 80.13%. In the light of the previous results, the researcher recommended to develop the language of word problems, to take into account their i
... Show MoreA skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.
In the present paper, by making use of the new generalized operator, some results of third order differential subordination and differential superordination consequence for analytic functions are obtained. Also, some sandwich-type theorems are presented.
Background: The most widely used vaccination against SARS-associated coronavirus (SARS-CoV-2) is the Pfizer vaccine, which provides protection against this virus. However, its ability to safeguard the oral cavity is unclear, and neither are the exact immunological biomarker levels it activates.
Aim of the study: To investigate the possibility that Pfizer vaccination protects the oral cavity against Covid-19.
Patients and Methods: The study group consisted of a total of 70 subjects (30 as the control group They were followed up before being vaccinated as non-vaccinated (maybe previously infected or non-infected or recovered) and 40 participants followed up three weeks after
... Show Morene,؛Stability constants were determined for complexes of amino acids : L-leuc tryptophane and Aspartic acid with thorium (IV ) and uranyle ( U02++) ions at ؛ serine
Fractional calculus has paid much attention in recent years, because it plays an essential role in many fields of science and engineering, where the study of stability theory of fractional differential equations emerges to be very important. In this paper, the stability of fractional order ordinary differential equations will be studied and introduced the backstepping method. The Lyapunov function is easily found by this method. This method also gives a guarantee of stable solutions for the fractional order differential equations. Furthermore it gives asymptotically stable.
Background: Breast cancer is the most frequently diagnosed malignancy and the second leading cause of mortality among women in Iraq forming 23% of cancer related deaths. The low survival from the disease is a direct consequence to the advanced stages at diagnoses. Aim: To document the composite stage of breast cancer among Iraqi patients at the time of diagnosis; correlating the observed findings with other clinical and pathological parameters at presentation. Patients and Methods: A retrospective study enrolling the clinical and pathological characteristics of 603 Iraqi female patients diagnosed with breast cancer. The composite stage of breast cancer was determined according to UICC TNM Classification System of Breast Cancer and the Ameri
... Show MoreAbstract
This paper discusses the essence of the developmental process in auditing firms and offices at the world today. This process is focused on how to adopt the audit concepts which is based on Information and Communication Technology (ICT), including the Continuous Auditing (CA) in particular. The purpose of this paper is to design a practical model for the adoption of CA and its requirements according to the Technology Acceptance Model (TAM). This model will serve as a road map for manage the change and development in the Iraqi auditing firms and offices. The paper uses the analytical approach in reaching to the target results. We design the logical and systematic relations between the nine variable
... Show MoreIn the task of detecting intrinsic plagiarism, the cases where reference corpus is absent are to be dealt with. This task is entirely based on inconsistencies within a given document. Detection of internal plagiarism has been considered as a classification problem. It can be estimated through taking into consideration self-based information from a given document.
The core contribution of the work proposed in this paper is associated with the document representation. Wherein, the document, also, the disjoint segments generated from it, have been represented as weight vectors demonstrating their main content. Where, for each element in these vectors, its average weight has been considered instead of its frequency.
Th
... Show MoreGlobal virtual teams (GVTs) are a recent organizational adaptation created to meet the needs of globalizatized marketplace. GVTs are essentially teams that are distributed across national boundaries and concerned through advanced information and communication technology (ICT) such as email, instant messaging, and video conferencing. The research on GVTs is important in the information system (IS) field because GVTs are dependent on information communication technology and the use of other technologies; GVTs also consists of people from different cultures. This paper tried to answer two research questions. The first one is: what are the GVTs problems facing the project manager (PM). A literature review was conducted to answer the fir
... Show More