In this research, dynamical study of an SIR epidemical model with nonlinear direct incidence rate (Beddington-De Angelis ) type, and regress of treatment investigated .An analytical study to the model shows that there are two equilibrium points appear, the discussed successfully with sufficient condition, the existence of local bifurcation and Hopf bifurcation was analyzed, finally numerical simulations are done to explain the analytic studies.
Due to the lack of vehicle-to-infrastructure (V2I) communication in the existing transportation systems, traffic light detection and recognition is essential for advanced driver assistant systems (ADAS) and road infrastructure surveys. Additionally, autonomous vehicles have the potential to change urban transportation by making it safe, economical, sustainable, congestion-free, and transportable in other ways. Because of their limitations, traditional traffic light detection and recognition algorithms are not able to recognize traffic lights as effectively as deep learning-based techniques, which take a lot of time and effort to develop. The main aim of this research is to propose a traffic light detection and recognition model based on
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More Is one of the processes of educational guidance to help the individual to design educational plans that fit with the abilities and inclinations and goals.
And research aims the current instruction program heuristic therapeutic knowledge to deal with emotional disorders. And may the researcher instruct a program according to the theories of interested and competent guidance to education and has studied the large number of studies available in this field, as has been the program on a number of specialists in education and Psychology and took their views. And then was adopted the final version of the indicative program, consistent with the sample, which was built
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreDecision-makers in each country work to define a list of internal and external interests, goals and threats to their countries according to the nature of their awareness of these interests, goals and threats.
Hence, Iraq is not an exception to this rule, and the process of evaluating its interests and the objectives of its foreign policy is subject to the pattern of awareness of decision-makers and the influencing forces in defining its basic interests, which often witness some kind of difference in defining them, evaluating their importance and determining the size of the threats they face. And among these interests and threats that have witnessed a difference in the assessment of their
... Show MoreThe current study aimed to isolate and diagnose the fungi associated with the inflammatory bowel disease patients with 150 samples distributed between 50 samples from Crohn's patients and 50 samples from ulcerative colitis patients, 50 control from Al-Kindy Al Teaching Hospital in Baghdad, Baghdad. Five types of yeast were isolated and identified, namely C. albicans, C.glabarta, Tropicales, C. parapsilosis, C. and C., krusi C. parapsilosis and.and Aspergillus, Penicillium, Muocer, Rhizopous, Saccharomycosis, and Cryptococcus, The results indicated the dominance of Candida spp. In crohn’s disease, the frequency of isolated Candida albicans was 24 (58.54%), Candida glabrata 11 (26.86%), Candida tropicalis 5 (12.2%) and Candida krusi was 1 (
... Show MoreCastellated columns are structural members that are created by breaking a rolled column along the center-line by flame after that rejoining the equivalent halves by welding such that for better structural strength against axial loading, the total column depth is increased by around 50 percent. The implementation of these institutional members will also contribute to significant economies of material value. The main objectives of this study are to study the enhancement of the load-carrying capacity of castellated columns with encasement of the columns by Reactive Powder Concrete (RPC) and lacing reinforcement, and serviceability of the confined castellated columns. The Castellated columns with RPC and Lacing Reinforcement improve com
... Show More