Preferred Language
Articles
/
jih-1810
Dynamical Study of An SIR Epidemic Model With Nonlinear Incidence Rate and Regress of Treatment
...Show More Authors

   In this research, dynamical study of an SIR epidemical model with nonlinear direct incidence rate (Beddington-De Angelis ) type, and regress of treatment investigated .An  analytical study  to the model shows that there are two equilibrium points appear, the discussed successfully with sufficient condition, the existence of local bifurcation and Hopf bifurcation was analyzed, finally numerical simulations are done to explain the analytic studies.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 28 2019
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
Heuristic Initialization And Similarity Integration Based Model for Improving Extractive Multi-Document Summarization
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Transfer Learning Based Traffic Light Detection and Recognition Using CNN Inception-V3 Model
...Show More Authors

Due to the lack of vehicle-to-infrastructure (V2I) communication in the existing transportation systems, traffic light detection and recognition is essential for advanced driver assistant systems (ADAS) and road infrastructure surveys. Additionally, autonomous vehicles have the potential to change urban transportation by making it safe, economical, sustainable, congestion-free, and transportable in other ways. Because of their limitations, traditional traffic light detection and recognition algorithms are not able to recognize traffic lights as effectively as deep learning-based techniques, which take a lot of time and effort to develop. The main aim of this research is to propose a traffic light detection and recognition model based on

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of Educational And Psychological Researches
guidance program Structured to address therapeutic cognitive emotional disorders (Anxiety and depression model)
...Show More Authors

           Is one of the processes of educational guidance to help the individual to design educational plans that fit with the abilities and inclinations and goals.
And research aims the current instruction program heuristic therapeutic knowledge to deal with emotional disorders. And may the researcher instruct a program according to the theories of interested and competent guidance to education and has studied the large number of studies available in this field, as has been the program on a number of specialists in education and Psychology and took their views. And then was adopted the final version of the indicative program, consistent with the sample, which was built

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The economic dimensions of the railway link between Iraq and Kuwait and the role of national alternatives (Faw port and the dry canal as a model(
...Show More Authors

   Decision-makers in each country work to define a list of internal and external interests, goals and threats to their countries according to the nature of their awareness of these interests, goals and threats. 

  Hence, Iraq is not an exception to this rule, and the process of evaluating its interests and the objectives of its foreign policy is subject to the pattern of awareness of decision-makers and the influencing forces in defining its basic interests, which often witness some kind of difference in defining them, evaluating their importance and determining the size of the threats they face. And among these interests and threats that have witnessed a difference in the assessment of their

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
كلية التربية الجامعة المستنصرية
Study the electron drift velocity in gas mixtures of CF3I with N2 obtained from Boltzmann equation analysis
...Show More Authors

Publication Date
Wed Jan 01 2014
Journal Name
كلية التربية -الجامعة المستنصرية
study the electron drift velocity in gas mixtures of SF6 with N2 obtained from Boltzmann equation analysis
...Show More Authors

Publication Date
Thu Jun 08 2023
Journal Name
Acta Biomed
Diagnostic study of the most important fungal infections associated with some inflammatory bowel disease in Iraqi patients
...Show More Authors

The current study aimed to isolate and diagnose the fungi associated with the inflammatory bowel disease patients with 150 samples distributed between 50 samples from Crohn's patients and 50 samples from ulcerative colitis patients, 50 control from Al-Kindy Al Teaching Hospital in Baghdad, Baghdad. Five types of yeast were isolated and identified, namely C. albicans, C.glabarta, Tropicales, C. parapsilosis, C. and C., krusi C. parapsilosis and.and Aspergillus, Penicillium, Muocer, Rhizopous, Saccharomycosis, and Cryptococcus, The results indicated the dominance of Candida spp. In crohn’s disease, the frequency of isolated Candida albicans was 24 (58.54%), Candida glabrata 11 (26.86%), Candida tropicalis 5 (12.2%) and Candida krusi was 1 (

... Show More
Publication Date
Tue Aug 03 2021
Journal Name
Key Engineering Materials
Study the Behavior of Castellated Steel Column Encasing by Different Reactive Powder Concrete Thickness with Laced Reinforcement
...Show More Authors

Castellated columns are structural members that are created by breaking a rolled column along the center-line by flame after that rejoining the equivalent halves by welding such that for better structural strength against axial loading, the total column depth is increased by around 50 percent. The implementation of these institutional members will also contribute to significant economies of material value. The main objectives of this study are to study the enhancement of the load-carrying capacity of castellated columns with encasement of the columns by Reactive Powder Concrete (RPC) and lacing reinforcement, and serviceability of the confined castellated columns. The Castellated columns with RPC and Lacing Reinforcement improve com

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref