Preferred Language
Articles
/
1RY-vooBVTCNdQwCS6QQ
Modeling and analysis of a prey-predator system incorporating fear, predator-dependent refuge, and cannibalism
...Show More Authors

Using a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were specified. The circumstances of local bifurcation that could take place close to the equilibrium points were discovered. Numerical simulations were run to validate the model's obtained long-term behavior and comprehend the effects of the model's key parameters in order to confirm our analytical conclusions. It has been observed that the system may have numerous coexistence equilibrium points, leading to bi-stable behavior. The fear rate reduces the multiplicity of the equilibrium point and converts the bi-stable situation into a stable case, which stabilizes the system (1) up to the top particular value.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Spike neural network as a controller in SDN network
...Show More Authors

The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Oct 06 2025
Journal Name
Engineering, Technology & Applied Science Research
Encased Pultruded GFRP Beams with Shear Connectors: A Review
...Show More Authors

This study examines the structural performance of concrete-encased pultruded Glass Fiber Reinforced Polymer (GFRP) I-sections with shear connections. It specifically focuses on how different parameters affect the latter’s ductility, flexural strength, and load-carrying capacity. The key variables studied include various shear connector types, spacing, and geometries, as well as the compressive strength of concrete and the properties of GFRP. The finite element modeling and experimental validation show that the shear connectors significantly improve the ductility, ultimate capacity, and load transmission efficiency. The present review emphasizes that the shear connectors greatly enhance the structural performance when they are prop

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Ranking Function to Solve a Fuzzy Multiple Objective Function
...Show More Authors

In this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better

View Publication Preview PDF
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Aluminum Rubbish as a Coagulant for Oily Wastewater Treatment
...Show More Authors

In this study an experimental work was done to study the possibility of using aluminum rubbish material as a coagulant to remove the colloidal particles from oily wastewater by dissolving this rubbish in sodium hydroxide solution. The experiments were carried out on simulated oily wastewater that was prepared at different oil concentrations and hardness levels (50, 250, 500, and 1000) ppm oil for (2000, 2500, 3000, and 3500) ppm CaCo3 respectively. The initial turbidity values were (203, 290, 770, and 1306) NTU, while the minimum values of turbidity that have been gained from the experiments in NTU units were (1.67, 1.95, 2.10, and 4.01) at best sodium aluminate dosages in milliliters (12, 20, 24, and 28) for

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (19)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Iranian Journal Of Nursing And Midwifery Research
Girls’ Experiences Regarding Obesity: A Qualitative Study in Iraq
...Show More Authors
Abstract<sec> <title>Background:

Obesity among girls can cause physical, psychological, or social problems. Different cultures have different lifestyle and dietary habits which affect people’s experience about obesity. This study aimed to assess girls’ experience toward obesity.

Materials and Methods:

In 2023, a qualitative conventional content analysis method was used in this study to meet the study’s objective in Baghdad and Babylon, Iraq. A probability purposive sampling method was used to gather the sample from three high schools in t

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
The Role of Supervisory and Training Practices in The Field Education Programmes in Achieving the Course Objectivesfrom the Perspective of the Student Teachers in the Faculty of Science and Arts in Sharourah
...Show More Authors

The present study aimed at identifying the role of supervisory and training practices in the field   education program in achieving course objectives from the perspective of the student teachers in the Faculty of Science and Arts in sharourah, and its relationship to some variables (gender, specialization,estimation). To achieve this, the researcher used the descriptive-analytical method, and the study tool was designed, which consists of (24) items distributed on two axes: the objectives of field education and supervisory and training practices.Then, the study tool was applied to the research sample represented in the entire study community, which consists of (65) male and female students in the Faculty of Sciences and Arts in

... Show More
View Publication Preview PDF