Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulation methods which are Mean Monte Carlo Finite difference (MMC_FD) and Mean Latin Hypercube Finite difference (MLH_FD), are also used to solve the proposed epidemic model under study. The obtained results are discussed, tabulated, and represented graphically. Finally, the absolute error is the tool used to compare the numerical simulation solutions from 2020 to 2024 years. The behavior of the Coronavirus in Iraq has been expected for 4 years from 2020 to 2024 using the proposed numerical simulation methods.
The research tackles an important subject, namely, the light text and how it works well in the Arab television programs. The methodological framework of the research presents the research problem stated in the following question: How can the text be used and what is its impact in the Arab TV programs? The importance of this research is that it deals with the subject of light text and its impact on Arab television programs.
This study is useful to the workers and scholars in the field of lighting as well as the goal of the research in (studying of the employment of light text in Arab television programs).
The limits of research were manifested in the study of the light text and how to make use of it
... Show MoreEducation quality evaluation is one of the objectives of education quality. The evaluation includes assessing the education standards and academic program outcomes to develop intellectual, scientific and practical concepts for the educational structure. It considers the determination of the rates of the number of accepted students and graduates. The research focuses on "what are the levels of education quality according to the evaluation mechanisms in the design department" to enhance the quality system and the objectives of theoretical and applied education.
It is identifying the levels of education quality and evaluating it according to the numbers and rates of graduate students of the design department branches for morning and ev
In this paper, the Magnetohydrodynamic (MHD) for Williamson fluid with varying temperature and concentration in an inclined channel with variable viscosity has been examined. The perturbation technique in terms of the Weissenberg number to obtain explicit forms for the velocity field has been used. All the solutions of physical parameters of the Darcy parameter , Reynolds number , Peclet number and Magnetic parameter are discussed under the different values as shown in plots.
A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.
A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance