In this paper, a compartmental differential epidemic model of COVID-19 pandemic transmission is constructed and analyzed that accounts for the effects of media coverage. The model can be categorized into eight distinct divisions: susceptible individuals, exposed individuals, quarantine class, infected individuals, isolated class, infectious material in the environment, media coverage, and recovered individuals. The qualitative analysis of the model indicates that the disease-free equilibrium point is asymptotically stable when the basic reproduction number R0 is less than one. Conversely, the endemic equilibrium is globally asymptotically stable when R0 is bigger than one. In addition, a sensitivity analysis is conducted to determine which model parameters impact the fundamental reproduction number most. Finally, some numerical simulations are implemented to reinforce the theoretical part. The results of this study indicate that media coverage may serve as a viable strategy to impede the transmission of Covid-19.
One of the rules concerning the control of civil transactions is the rule of no harm and harm, which was enacted by our Holy Prophet Muhammad (peace be upon him and his family). Scholars singled it out by research and investigation, and classified by non-scientists independent messages, showing the status of al-Qaeda in terms of its perception, meaning, branches and results, and the importance of this rule in the payment of damage and compensation for it has been provided by the Iraqi legislator generous within the provisions of Iraqi law in all its branches of public and private, as applied The judiciary Iraq The provisions of this rule have been issued and numerous decisions have been made to compensate for the damage and to give to ev
... Show MoreThe hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre
... Show MoreAcceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.
An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo
... Show MoreDrag reduction (DR) techniques are used to improve the flow by spare the flow energy. The applications of DR are conduits in oil pipelines, oil well operations and flood water disposal, many techniques for drag reduction are used. One of these techniques is microbubbles. In this work, reduce of drag percent occurs by using a small bubbles of air pumped in the fluid transported. Gasoil is used as liquid transporting in the pipelines and air pumped as microbubbles. This study shows that the maximum value of drag reduction is 25.11%.
The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst
... Show MoreThe aim of the research is to identify an appropriate training method that raises the levels of immune globulins (IgA, IgM, IgG) and white blood cells and the effect of training by (HIT) method using resistance (weights) as a training curriculum that increases immunity and ensures the continuation of the pills after the return of activity from the stone The response to the Covid-19 epidemic among amateur weightlifters, the researchers relied on the method of trace analysis in an experimental way by conducting a pre-, medial and post-test with the same experimental one agroup on a sample of amateur weightlifters in the Fury private hall for weightlifting and body building in Adhamiya, the number of sample members reached (15 players) who int
... Show MoreThe research aims to identify the new reality of Iraq’s international relations through the news
coverage carried out by Al-Iraqiya TV since the size and nature of the coverage indicate the extent
to which these relations have reached. The research problem is summarized by the main question
(what is the size and nature of news coverage of Iraq’s international relations in the Iraqi News
Channel?).
This research is considered a descriptive research, as the researchers used the survey method and the
content analysis method through a partial confinement of the research community consisting of the
main news broadcast for one programmatic period. The content analysis form that was subjected to
evaluation was design