This research aims to solve the nonlinear model formulated in a system of differential equations with an initial value problem (IVP) represented in COVID-19 mathematical epidemiology model as an application using new approach: Approximate Shrunken are proposed to solve such model under investigation, which combines classic numerical method and numerical simulation techniques in an effective statistical form which is shrunken estimation formula. Two numerical simulation methods are used firstly to solve this model: Mean Monte Carlo Runge-Kutta and Mean Latin Hypercube Runge-Kutta Methods. Then two approximate simulation methods are proposed to solve the current study. The results of the proposed approximate shrunken methods and the numerical simulation methods are compared with the standard results of the numerical method which is Runge-Kutta 4th Method from the year 2021 to 2025, using the absolute error, through comparison, it becomes clear that the approximate proposed solution is better and closer to the standard solution than the solutions of other methods that used to solve this system. The results are tabulated and represented graphically, as well as a discussion to prove the efficiency of the proposed methods.
Consistent "with the thought of tax talk is unified tax natural evolution for him, as the application leads to the inclusion of tax all branches of income and its sources and through truncated part of this entry through the application of price ascending it, it means the procedures of tax reform. Taxes on total income characterized by giving a clear picture of the total income of the taxpayer and its financial situation and its burden family which allows granting exemptions, downloads, and application of prices that fit this case. This requires reconsideration of the structure of the tax system in force and the transition from a system specific taxes to the tax system on the total income of the integration of income from the rental of re
... Show MoreConventional identification of three coccoid green algae isolates was attempted to characterize the studied algae morphologically under compound microscope, which demonstrated confusional phenomenal convergence; all were classified microscopically as the green alga Chlorella vulgaris Beijerinck, 1890.
Phylogenetic studies were conducted to settle the argument about the phenotype by studying the genotype. Genotype the promising field in advance classification by using 18S rRNA and compared to GenBank database using to search the related sequences. The determined sequences showed high a similarity to the strains registered in GenBank.
&
... Show MoreA new method is characterized by simplicity, accuracy and speed for determination of Oxonuim ion in ionisable inorganic acid such as hydrochloric (0.1 - 10) ,Sulphuric ( 0.1 - 6 ),nitric ( 0.1 - 10 ), perchloric ( 0.1 - 7 ), acetic (0.1 - 100 ) and phosphoric ( 0.1 - 30 ) ( mMol.L-1 )acids. By continuous flow injection analysis. The proposed method was based on generation of bromine from the Bro-3-Br-- H3O+. Bromine reacts with fluorescein to quenches the fluorescence . A sample volume no.1 (31μl) and no.2 (35μl) were used with flow rate of 0.95 mL.min-1 using H2O line no.1as carrier stream and 1.3 mL.min-1 using fluorescein sodium salt line no.2. Linear regression of the concentration ( mMol.L-1 ) Vs quenched fluorescence gives a correla
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreIn the present study, MCM-41 was synthesis as a carrier for poorly drugs soluble in water, by the sol-gel technique. Textural and chemical characterizations of MCM-41 were carried out by X-ray diffraction (XRD), Fourier transform infrared (FTIR), scanning electron microscope (SEM), and thermal gravimetric analysis (TGA). The experimental results were analyzed mesoporous carriers MCM-41. With maximum drug loading efficiency in MCM-41 determined to be 90.74%. The NYS released was prudently studied in simulated body fluid (SBF) pH 7.4 and the results proved that the release of NYS from MCM-41 was (87.79%) after 18 hr. The data of NYS released was found to be submitted a Weibull model with a correlation coefficient of (0.995). The Historical
... Show More