Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulation methods which are Mean Monte Carlo Finite difference (MMC_FD) and Mean Latin Hypercube Finite difference (MLH_FD), are also used to solve the proposed epidemic model under study. The obtained results are discussed, tabulated, and represented graphically. Finally, the absolute error is the tool used to compare the numerical simulation solutions from 2020 to 2024 years. The behavior of the Coronavirus in Iraq has been expected for 4 years from 2020 to 2024 using the proposed numerical simulation methods.
For the first time Iron tungstate semiconductor oxides films (FeWO4) was successfully synthesized simply by advanced controlled chemical spray pyrolysis technique, via employed double nozzle instead of single nozzle using tungstic acid and iron nitrate solutions at three different compositions and spray separately at same time on heated silicone (n-type) substrate at 600 °C, followed by annealing treatment for one hour at 500 °C. The crystal structure, microstructure and morphology properties of prepared films were studied by X-ray diffraction analysis (XRD), electron Scanning Electron Microscopy (SEM) and Atomic Force Microscopy (AFM) respectively. According to characterization techniques, a material of well-crystallized monoclinic ph
... Show MoreThe adsorption of copper ions onto produced activated carbon from banana peels (with particle size 250 µm) in a single component system with applying magnetic field has been studied using fixed bed adsorber. The fixed bed breakthrough curves for the copper ions were investigated. The adsorption capacity for Cu (II) was investigated. It was found that 1) the exposure distance (E.D) and strength of magnetic field (B), affected the degree of adsorption; and 2) experiments showed that removal of Cu ions and accumulative adsorption capacity of adsorbent increase as the exposure distance and strength of magnetic field increase.
The study aimed to identify the reality of the application of the organizational equity empowerment at the Jordanian government institutions from the viewpoint of women employees in terms of each of the (delegation equity, training equity, appraisal equity, join in committees equity, participation in decision-making equity), and the impact of non-application of equity empowerment on performance.
Population of the study amounted (986) women employee, while the researcher distributed (340) questionnaire through a randomly sample method.
The study used the questionnaire as a tool to collect the data. And to ensure the reliability of the questionnaire has been calculated Cronbach's co
... Show MoreGlobally, buildings use about 40% of energy. Many elements, such as the physical properties of the structure, the efficiency of the cooling and heating systems, the activity of the occupants, and the building’s sustainability, affect the energy consumption of a building. It is really difficult to predict how much energy a building will need. To improve the building’s sustainability and create sustainable energy sources to reduce carbon dioxide emissions from fossil fuel combustion, estimating the building's energy use is necessary. This paper explains the energy consumed in the lecture building of the Al-Khwarizmi College of Engineering, University of Baghdad (UOB), Baghdad, Iraq. The weather data and the building construction informati
... Show MoreTheauthor addressed politeness discourse in “Surat Ghafir”. Quran texts include many rhetorical utterances which are considered pragmatic mechanismsconcerned with finding polite discourse. examining these texts allow to determine the effectiveness degree in the discourse, and to find the effect level that leads to interaction between the speaker and the listener. Graduation is considered an effect and a mechanism of discourse escalation.
The author reached a common definition of the graduation effectiveness term, due to its importance in finding polite discourse that is constructed by lingual manifestations some of which are escalation and graduation. Escalation is a mechanism to show the level of discourse graduation, it is a mea
The properties of capturing of peristaltic flow to a chemically reacting couple stress fluid through an inclined asymmetric channel with variable viscosity and various boundaries are investigated. we have addressed the impacts of variable viscosity, different wave forms, porous medium, heat and mass transfer for peristaltic transport of hydro magnetic couple stress liquid in inclined asymmetric channel with different boundaries. Moreover, The Fluid viscosity assumed to vary as an exponential function of temperature. Effects of almost flow parameters are studied analytically and computed. An rising in the temperature and concentration profiles return to heat and mass transfer Biot numbers. Noteworthy, the Soret and Dufour number effect resul
... Show MoreAbstract: Lymphoproliferative Disorders (LPDs) are a group of neoplasms affecting various cells within lymphoid system. Each type has different treatment a..70619
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreOften times, especially in practical applications, it is difficult to obtain data that is not tainted by a problem that may be related to the inconsistency of the variance of error or any other problem that impedes the use of the usual methods represented by the method of the ordinary least squares (OLS), To find the capabilities of the features of the multiple linear models, This is why many statisticians resort to the use of estimates by immune methods Especially with the presence of outliers, as well as the problem of error Variance instability, Two methods of horsepower were adopted, they are the robust weighted least square(RWLS)& the two-step robust weighted least square method(TSRWLS), and their performance was verifie
... Show More