Preferred Language
Articles
/
jih-2945
Comparison of Some Numerical Simulation Techniques for COVID-19 Model in Iraq
...Show More Authors

The aim of our study is to solve a nonlinear epidemic model, which is the COVID-19 epidemic model in Iraq, through the application of initial value problems in the current study. The model has been presented as a system of ordinary differential equations that has parameters that change with time. Two numerical simulation methods are proposed to solve this model as suitable methods for solving systems whose coefficients change over time. These methods are the Mean Monte Carlo Runge-Kutta method (MMC_RK) and the Mean Latin Hypercube Runge-Kutta method (MLH_RK). The results of numerical simulation methods are compared with the results of the numerical Runge-Kutta 4th order method (RK4) from 2021 to 2025 using the absolute error, which proves that the MLH_RK method is the best and closest to the expected values. The results have been discussed after being tabulated and represented graphically. Epidemic behavior for the next two years until 2025 has been projected using the proposed methods.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
An algorithm for binary codebook design based on the average bitmap replacement error (ABPRE)
...Show More Authors

In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 29 2018
Journal Name
Iraqi Journal Of Science
In2O3-ZnO pyramids like structure prepared by Spray-pyrolysis Technique for gas Sensing Applications
...Show More Authors

Polycrystalline Indium oxide (In2O3) and Indium oxide-zinc oxide (IZO) thin films mixed with 10% ZnO content were prepared by spray-pyrolysis technique at relatively low substrate temperature (150 ˚C).Field emission scanning electron microscope (FE-SEM) shows that the nanostructure at 10% ZnO content has pyramid like structure. The hall effect measurements show that the prepared samples have n-type charge carriers .The films were examined as gas sensor against H2S gas at different operating temperatures (200, 250 and 300) oC, and it was found that the IZO sample a good sensitivity to H2S gas ~ 572 % at operating temperature 200 oC, with relatively fast response time of 19 s and recovery time of 17

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 21 2021
Journal Name
Iraqi Journal Of Science
Synthesis and Spectroscopic Study for Pt (IV) Complexes with 4-Aminoantipyrine and Sodium Pyrophosphate
...Show More Authors

Pt (IV) complexes were synthesized from 4-Aminoantipyrine (4-AAP) as a primary ligand, and sodium pyrophosphate as a secondary ligand using metal: ligand in (1:1) mole ratio with molecular formula [Pt (4-AAP)Cl4],[Pt (4-AAP)(Pyph)Cl2]. These complexes were characterized by elemental microanalysis (C.H.N), (A.A), [I.R, (U.V–Vis), mass spectroscopy], along with molar conductivity, chloride contents and melting point measurements. The ligands (4-AAP) and (Pyph) gave octahedral geometry with Pt (IV) rapid, simple, sensitive and validated spectrophotometric method has been described for the determination of platinum (IV) using 4-aminoantipyrine. The complex product was quantitatively measured at 385nm and the reaction conditions were studie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
High Transaction Rates Performance Evaluation for Secure E-government Based on Private Blockchain Scheme
...Show More Authors

 

The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Deriving the Composite Simpson Rule by Using Bernstein Polynomials for Solving Volterra Integral Equations
...Show More Authors

In this paper we use Bernstein polynomials for deriving the modified Simpson's 3/8 , and the composite modified Simpson's 3/8 to solve one dimensional linear Volterra integral equations of the second kind , and we find that the solution computed by this procedure is very close to exact solution.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 13 2011
Journal Name
Baghdad Science Journal
The mucosal and systemic immune status for diabetic and non-diabetic Dentialvcolar infected patients
...Show More Authors

From a group of 60 patients with dentoalveolar infections among which 10 were diabetic and 10 non-diabetic were elected as test group as well as 10 normal subjects as control group. Six Staphylococcus aureus and Streptococcus anginousus were diagnosed in the first and second group of the patients the immune status of the patients and control subject were tested by pathogen specific antibody titre, neotrophil NBT reduction phagocytosis and leukocyte inhibition LIF. Diabetic patients with dentoalveolar infection shows decreased specific antibody titers, subnormal neutrophil NBT phagocytic % as well as non significant LIF % in comparison non diabetic reveal high specific antibody titers against , high neutrophil NBT% and significant LIF% re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
Stability And Data Dependence Results For The Mann Iteration Schemes on n-Banach Space
...Show More Authors

Let  be an n-Banach space, M be a nonempty closed convex subset of , and S:M→M be a mapping that belongs to the class  mapping. The purpose of this paper is to study the stability and data dependence results of a Mann iteration scheme on n-Banach space

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Investigating Particular Representations for Matrix Lie Groups SO(3) and SL(2,₵)
...Show More Authors

A complexified adjoint representations of the complexification Lie algebras associated with the special orthogonal group SO(3) and special linear group SL(2,₵)  have been obtained. A new representation of their tensor product is naturally arisen and computed in details.

View Publication Preview PDF
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Generating dynamic S-BOX based on Particle Swarm Optimization and Chaos Theory for AES
...Show More Authors

Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm  in order to remove these weakness points, Will be generated dynamic substitution box (S-B

... Show More
View Publication Preview PDF
Publication Date
Thu May 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Approximate Solution for Two Machine Flow Shop Scheduling Problem to Minimize the Total Earliness
...Show More Authors

This paper proposes a new algorithm (F2SE) and algorithm (Alg(n – 1)) for solving the
two-machine flow shop problem with the objective of minimizing total earliness. This
complexity result leads us to use an enumeration solution approach for the algorithm (F2SE)
and (DM) is more effective than algorithm Alg( n – 1) to obtain approximate solution.

View Publication Preview PDF