In this paper, the deterministic and the stochastic models are proposed to study the interaction of the Coronavirus (COVID-19) with host cells inside the human body. In the deterministic model, the value of the basic reproduction number determines the persistence or extinction of the COVID-19. If , one infected cell will transmit the virus to less than one cell, as a result, the person carrying the Coronavirus will get rid of the disease .If the infected cell will be able to infect all cells that contain ACE receptors. The stochastic model proves that if are sufficiently large then maybe give us ultimate disease extinction although , and this facts also proved by computer simulation.
يواجه المصرف تحولات عديدة أثناء سير عمله ولا سيما قد تحول من مصرف صناعي يسعى الى تحقيق التنمية الصناعية ، من خلال منحه قروض وتسهيلات تنموية وتدعمه الدوله ، الى مصرف شامل يسعى الى تحقيق الربحية في ظل تنويع الأنشطة والخدمات والعمليات الائتمانية.يهدف البحث الى دراسة التحولات التي حدثت في المصرف الصناعي، وتأثير هذا التحول على النشاط الائتماني. وقد استند في ذلك على فرضية رئيسة وهي :-
... Show Moreالحقوق والحريات السياسية " دراسة مقارنة بين المواثيق الدولية والشريعة الاسلامية"
Introduction and Aim: Diabetes mellitus patients almost always struggle with a metabolic condition known as chronic hyperglycemia. According to the World Health Organization, osteoporosis is a progressive systemic skeletal disorder that is characterized by decreasing bone mass and microstructural breakdown of bone tissue that increases susceptibility to fracture and increased risk of breaking a bone. Here, we aimed to compare the levels of CatK and total oxidative state in patients with diabetes and osteoporosis among the female Iraqi population and study the possible relationship between them. Materials and Methods: This study included 40 females with diabetes (Group G1), 40 with diabetes and osteoporosis (Group G2) and 40 normal healthy f
... Show MoreThe consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreThe textbook is the primary means of creativity and thinking, which has a major role in the development of the readership and mental abilities of the student. It is the basic tool in education in Iraq for the teacher and the student, which cannot be dispensed in any educational program. The current study aimed at the book of the biology of the sixth grade of science in Iraq (comparative study). It was compared to the book of biology for the twelve grade in the Kingdom of Jordan to identify the ratio of similarity and differences between them, in addition, to identify the weaknesses in the Iraq curriculum and developing appropriate solutions and suggestions to address them. The sample was represented with books of biology (six-science cla
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreBackground: The purpose of this study is to compare the color changes between the bonded middle third and the unbonded gingival and incisal thirds, fallowing fixed orthodontic treatment Material and method: The color parameter l, a, b has been recorded for each thirds in upper anterior teeth by mean of easy shad device. The has been calculated for gingival, middle and incisal thirds for the upper anterior teeth in 34 patient, 17 males and 17femals, those subject undergone fixed orthodontic treatment Results: The in middle bonded third is highly significant higher than that in incise and gingival thirds p<0.01 because the middle third isn’t expose to oral fluid and dental brushing since it covered by the bracket. Also there
... Show MoreThe recent escalation in Southeast Asia showed that the region is on the verge of political and economic crises through the United States and its allies imposing economic sanctions against China, and a military escalation that may begin with China’s invasion of Taiwan, especially since two-thirds of the American forces in the world are located in the Taiwan Strait and the South China Sea.
The United States claims that it is ready to defend the island of Taiwan in the event of the start of Chinese military operations, but the reality shows that the United States supports Taiwan militarily by equipping it with modern weapons to defend itself. Supporting Taiwan economically by engaging it in trade agreements with US allies in the r
... Show More