Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulation methods which are Mean Monte Carlo Finite difference (MMC_FD) and Mean Latin Hypercube Finite difference (MLH_FD), are also used to solve the proposed epidemic model under study. The obtained results are discussed, tabulated, and represented graphically. Finally, the absolute error is the tool used to compare the numerical simulation solutions from 2020 to 2024 years. The behavior of the Coronavirus in Iraq has been expected for 4 years from 2020 to 2024 using the proposed numerical simulation methods.
This paper identifies and describes the textual densities of ideational metaphors through the application of GM theory (Halliday, 1994) to the textual analysis of two twentieth century English short stories: one American (The Mansion (1910-11), by Henry Jackson van Dyke Jr.), and one British (Home (1951), by William Somerset Maugham). One aim is to get at textually verifiable statistical evidence that attests to the observed dominance of GM nominalization in academic and scientific texts, rather than to fiction (e.g. Halliday and Martin (1993). Another aim is to explore any significant differentiation in GM’s us by the two short- story writers. The research has been carried out by identifying, describing, and statistically analysi
... Show MoreThis paper presents a cognition path planning with control algorithm design for a nonholonomic wheeled mobile robot based on Particle Swarm Optimization (PSO) algorithm. The aim of this work is to propose the circular roadmap (CRM) method to plan and generate optimal path with free navigation as well as to propose a nonlinear MIMO-PID-MENN controller in order to track the wheeled mobile robot on the reference path. The PSO is used to find an online tune the control parameters of the proposed controller to get the best torques actions for the wheeled mobile robot. The numerical simulation results based on the Matlab package show that the proposed structure has a precise and highly accurate distance of the generated refere
... Show MoreResearch includes three axes, the first is the average estimate time of achievement (day) to work oversight, to five supervisory departments in the Office of Financial Supervision Federal and then choose the three control outputs and at the level of each of the five departments above, and after analyzing the data statistically back to us that the distribution of the times of achievement It is the exponential distribution (Exponential Distribution) a parameter (q), and the distribution of normal (Normal Distribution) with two parameters (μ, σ2), and introduced four methods of parameter estimation (q) as well as four modalities parameter to estimate (
... Show MoreThe question of estimation took a great interest in some engineering, statistical applications, various applied, human sciences, the methods provided by it helped to identify and accurately the many random processes.
In this paper, methods were used through which the reliability function, risk function, and estimation of the distribution parameters were used, and the methods are (Moment Method, Maximum Likelihood Method), where an experimental study was conducted using a simulation method for the purpose of comparing the methods to show which of these methods are competent in practical application This is based on the observations generated from the Rayleigh logarithmic distribution (RL) with sample sizes
... Show MoreThe absorption spectrum for three types of metal ions in different concentrations has been studying experimentally and theoretically. The examination model is by Gaius model in order to find the best fitting curve and the equation controlled with this behavior. The three metal ions are (Copper chloride Cu+2, Iron chloride Fe+3, and Cobalt chloride Co+2) with different concentrations (10-4, 10-5, 10-6, 10-7) gm/m3. The spectroscopic study included UV-visible and fluorescence spectrum for all different concentrations sample. The results refer to several peaks that appear from the absorption spectrum in the high concentration of all metal ions solution.
... Show MoreAir-conditioning systems (ACs) are essential in hot and humid climates to ensure acceptable ambient air quality as well as thermal comfort for buildings users. It is essential to improve refrigeration system performance without increasing the effects of global warming potential (GWP) and ozone depletion potential (ODP). The main objective of this study is to evaluate the performance of an air conditioning system that operates with a liquid suction heat exchanger (LSHX) through implementing refrigerants with zero OPD and low GWP (i.e., R134a and R1234yf). Liquid suction heat exchanger (LSHX) was added to an automobile air conditioning system (AACS).When Liquid suction heat exchanger was added to the cycle, primary results indicated t
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThe variety of ideas and freedom of expression among the authors who are looking for everything new that serves the goals of musical and aesthetic expression, which calls for the use of traditional musical instruments with the great composition of musical instruments known as the orchestra represents a great challenge in several aspects. The incompetence of some of these instruments or limited capabilities or its costly method of performance sometimes forbids its use permanently in this great composition. It was necessary to have some problems facing the composer and the player on the one hand and the recipient on the other hand, who must be looking for perfection. Among those instruments that are used regularly in the works of the orche
... Show More