Preferred Language
Articles
/
1RY-vooBVTCNdQwCS6QQ
Modeling and analysis of a prey-predator system incorporating fear, predator-dependent refuge, and cannibalism
...Show More Authors

Using a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were specified. The circumstances of local bifurcation that could take place close to the equilibrium points were discovered. Numerical simulations were run to validate the model's obtained long-term behavior and comprehend the effects of the model's key parameters in order to confirm our analytical conclusions. It has been observed that the system may have numerous coexistence equilibrium points, leading to bi-stable behavior. The fear rate reduces the multiplicity of the equilibrium point and converts the bi-stable situation into a stable case, which stabilizes the system (1) up to the top particular value.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 13 2022
Journal Name
Lecture Notes In Networks And Systems
Design and FPGA Implementation of Matrix Multiplier Using DEMUX-RCA-Based Vedic Multiplier
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 18 2024
Journal Name
2023 Asee Annual Conference & Exposition Proceedings
Study of Artificial Intelligence Computing Devices for Undergraduate Computer Science and Engineering Labs
...Show More Authors

View Publication
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
International Education And Culture Studies (iecs)
The Impact of Virtual Trips on Lateral Thinking and Middle School Student’s Achievement
...Show More Authors

Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Synthesis and spectral studies of heterocyclic azo dye complexes with some transition metals
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Oct 12 2022
Journal Name
College Of Islamic Sciences
TAQWA "Piety", TAWAKKUL "Trusting” AND NIYYAH "Intention" ARE AMONG THE FACTORS OF ADJUSTMENT
...Show More Authors

Abstract:-

The title of the thesis (TAQWA "Piety", TAWAKKUL "Trusting” AND NIYYAH "Intention" ARE AMONG THE FACTORS OF ADJUSTMENT) is related to the first legislative source of Islam, the Qur’an, and highlights the positive effects while adhering to the teachings of Islamic Sharia in terms of its importance in building the individual and thus society.

In this study, the researcher follows the objective approach, which includes collecting verses that refer to the issue of piety, trust and intention, and studying the verses objectively according to the sources, language books, ethics, and so on.

I sought to give each topic important headings, then study the topic and clarify it in general, based on narrations an

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Aip Conference Proceedings
Synthesis and characterization study of n-Bi2O3/p-Si heterojunction dependence on thickness
...Show More Authors

View Publication
Scopus (13)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Fri Jan 15 2021
Journal Name
Obstetrics & Gynecology Science
Effects of excessive tea consumption on pregnancy weight gain and neonatal birth weight
...Show More Authors

Objective Tea lovers are increasing worldwide. We hope that this report is the first to discuss the possible impacts of high black tea consumption on gestational weight gain (GWG) and birth parameters. Methods Throughout one year, a total of 7,063 pregnant ladies coming for first antenatal visit were screened in a major tertiary center. Of them, 1,138 were involved and divided according to their preference into 3 groups: excessive tea (ET), usual tea (UT), and mixed beverages group. The study included women who gave birth to healthy neonates. Results The rate of ET consumption was 4.13% with a total of 41 cases. The UT group (controls) comprised 94 women. ET was significantly associated (P<0.05) with maternal age, parity, occupation, smokin

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jan 19 2021
Journal Name
Sn Applied Sciences
Post-fire serviceability and residual strength of composite post-tensioned concrete T-beams
...Show More Authors
Abstract<p>In this study, the response of ten composite post-tensioned concrete beams topped by a reinforced concrete deck with adequate reinforcing shear connectors is investigated. Depending on the concrete compressive strength of the deck slab (20, 30, and 40 MPa), beams are grouped into three categories. Seven of these beams are exposed to a fire attack of 700 and 800 °C temperature simultaneously with or without the presence of a uniformly distributed sustained static loading. After cooling back to ambient temperature, these composite beams are loaded up to failure, using a force control module, by monotonic static loading in a four-point-bending setup with two symmetrical concentrated loads applied in </p> ... Show More
View Publication Preview PDF
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Performance Study of AODV, GRP and OSPFv3 MANET Routing Protocols Using OPNET Modeler
...Show More Authors

A Mobile Ad hoc Network (MANET) is a collection of mobile nodes, that forms on the fly a temporary wireless multi-hop network in a self-organizing way, without relying on any established infrastructure. In MANET, a pair of nodes exchange messages either over a direct wireless link, or over a sequence of wireless links including one or more intermediate nodes. For this purpose, an efficient routing protocol is required. This paper introduced performance study of three of MANET protocols (AODV, GRP and OSPFv3). This study was one of the newer studies because wireless communication played an important role in today’s application and the field of mobile ad hoc network becomes very popular for the researchers in the last years. This study w

... Show More
View Publication Preview PDF
Crossref