The aim of our study is to solve a nonlinear epidemic model, which is the COVID-19 epidemic model in Iraq, through the application of initial value problems in the current study. The model has been presented as a system of ordinary differential equations that has parameters that change with time. Two numerical simulation methods are proposed to solve this model as suitable methods for solving systems whose coefficients change over time. These methods are the Mean Monte Carlo Runge-Kutta method (MMC_RK) and the Mean Latin Hypercube Runge-Kutta method (MLH_RK). The results of numerical simulation methods are compared with the results of the numerical Runge-Kutta 4th order method (RK4) from 2021 to 2025 using the absolute error, which proves that the MLH_RK method is the best and closest to the expected values. The results have been discussed after being tabulated and represented graphically. Epidemic behavior for the next two years until 2025 has been projected using the proposed methods.
This paper reports a fiber Bragg grating (FBG) as a biosensor. The FBGs were etched using a chemical agent,namely,hydrofluoric acid (HF). This implies the removal of some part of the cladding layer. Consequently, the evanescent field propagating out of the core will be closer to the environment and become more sensitive to the change in the surrounding. The proposed FBG sensor was utilized to detect toxic heavy metal ions aqueous medium namely, copper ions (Cu2+). Two FBG sensors were etched with 20 and 40 μm diameters and fabricated. The sensors were studied towards Cu2+ with different concentrations using wavelength shift as a result of the interaction between the evanescent field and copper ions. The FBG sensors showed
... Show MoreFunctional dyspepsia is one of the most common gastrointestinal symptoms and attributed to various causes including Helicobacter pylori infection. AIM OF THE STUDY: To correlate Helicobacter pylori infection to functional dyspepsia and to identify the possible risk factors for this infection. PATIENTS AND METHODS: Fifty patients who were referred to the endoscopy unit for dyspepsia symptoms, secondary gastric causes of dyspepsia were excluded during endoscopy, gastric biopsies were taken for histopathological study and for bedside urease test for detection of Helicobacter pylori infection. RESULTS: 62% of non-ulcer dyspeptic patients were infected with Helicobacter pylori, 74.2% of the patients were above 30 years old, female gender patient
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as
... Show MoreIn this paper, we introduce a new digital authentication certification system to keep the classified documents' information safe. The proposed system is a steganography system divided into two subsystems, the first subsystem is responsible for embedding the information about the person, and it works in the main foundation that issues the documents, while the second subsystem is found in the beneficiary directorates to extract the true information of the person.