The spread of novel coronavirus disease (COVID-19) has resulted in chaos around the globe. The infected cases are still increasing, with many countries still showing a trend of growing daily cases. To forecast the trend of active cases, a mathematical model, namely the SIR model was used, to visualize the spread of COVID-19. For this article, the forecast of the spread of the virus in Malaysia has been made, assuming that all Malaysian will eventually be susceptible. With no vaccine and antiviral drug currently developed, the visualization of how the peak of infection (namely flattening the curve) can be reduced to minimize the effect of COVID-19 disease. For Malaysians, let’s ensure to follow the rules and obey the SOP to lower the R0 value from time to time, hoping that the virus will vanish one day.
The whole world and the Arab world, especially an important part of this international system, is undergoing a radical transformation at all levels. This mosaic of political, economic, social and military relations and alliances, whether based on the special interests of the major Powers or on the basis of mutual interests, The major transformations to social, economic, political and military conflict and these transformations still bear more surprises, at all levels, nothing remains constant, all changed, relations changed and alliances changed and loyalties fell and the principles of the M changed and the spectacular imperial economies collapsed and the will of the masses was no longer fixed.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreEvery so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show MoreIn this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect
... Show MoreThis paper aims to give an overview of acculturation in the literature by means of its explicit definitions, main characteristics, and categorical process. It also foreshadows the significance of acquiring novice culture with particular connection to second language acquisition. Schumann and John Berry underscored acculturation each with its own model of acculturation. In the case of this review, you will realize that Schumann's two main aspects are firmly rooted in berry's model of acculturation as an exclusive description in relation to second language acquisition. Steven Krashen outlined acquiring language from the intellectual and linguistic view of learning, whereas Micheal Long demanded for communication in social perspective. It has
... Show MoreThe ZnO nanoparticles were synthesized at various precursor concentrations i.e. 0.05, 0.1, and 0.5 M by biosynthesis method based on Pometia pinnata Leaf Extracts. Initial nanoparticle concentration influenced the optical bandgap, shape, and structure of nanoparticles. The photodegradation process was carried out under UV illumination. The efficiency of MB degradation was determined by measuring the decrease in MB concentration and by analyzing the optical absorption at 663 nm recorded by UV-Vis spectroscopy. Results showed that the biosynthesized ZnO nanoparticles exhibited efficient photodegradation of MB, with a maximum degradation rate of 80% after 90 minutes of exposure to UV-C light. The study highlights the potential of Pometia pi
... Show MoreThe Evaluation of the immune response in Golden Hamsters experimentally infected with Leishmania donovani was determined in this study, particularly, the cellular immune response. Follow up has maintained to determine the Delayed Type of Hypersensitivity using skin test both in infected and control lab animals. Chicken red blood cells were used as a parameter to evaluate the immune system; they are dull and have the ability of immunization. Two concentrations of chicken R.B.C were examined to determine which gives the higher titration in Hamsters and those were 1.5 X 109 cell/ml and 3 X 109 cell/ml , the second concentration gave the maximum titration where then used in this work. After sensitization with Chicken R.B.C for both infected a
... Show MoreThe objective of this study was to investigate the prophylactic roles of human enteric derived Lactobacillus plantarum L1 (Ll) and Lactobacillus paracasei L2 (L2), on EHEC O157:H7 infection in rodent models (In vivo). The Lactobacillus suspensions (L1 and L2) were individually and orally administered to experimental rats at a daily two consecutives of 100 μl (108 CFU/ ml/rat) for up to two weeks. Thereafter, on the 8th day of experiment rats were orally challenged with one dose infection of EHEC (105 CFU/ml/rat). Animals mortality and illness symptoms have been monitored. There was no fatal EHEC infection in rats that had been pre‑colonized with the Lactobacillus strains, while most of EHEC infected rats were died (90%). The
... Show MoreThe Evaluation of the immune response in Golden Hamsters experimentally infected with Leishmania donovani was determined in this study, particularly, the cellular immune response. Follow up has maintained to determine the Delayed Type of Hypersensitivity using skin test both in infected and control lab animals. Chicken red blood cells were used as a parameter to evaluate the immune system; they are dull and have the ability of immunization. Two concentrations of chicken R.B.C were examined to determine which gives the higher titration in Hamsters and those were 1.5 X 109 cell/ml and 3 X 109 cell/ml , the second concentration gave the maximum titration where then used in this work. After sensitization with Chicken R.B.C for both in
... Show MoreAbstract
The prevention of bankruptcy not only prolongs the economic life of the company and increases its financial performance, but also helps to improve the general economic well-being of the country. Therefore, forecasting the financial shortfall can affect various factors and affect different aspects of the company, including dividends. In this regard, this study examines the prediction of the financial deficit of companies that use the logistic regression method and its impact on the earnings per share of companies listed on the Iraqi Stock Exchange. The time period of the research is from 2015 to 2020, where 33 companies that were accepted in the Iraqi Stock Exchange were selected as a sample, and the res
... Show More