Preferred Language
Articles
/
1RY-vooBVTCNdQwCS6QQ
Modeling and analysis of a prey-predator system incorporating fear, predator-dependent refuge, and cannibalism
...Show More Authors

Using a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were specified. The circumstances of local bifurcation that could take place close to the equilibrium points were discovered. Numerical simulations were run to validate the model's obtained long-term behavior and comprehend the effects of the model's key parameters in order to confirm our analytical conclusions. It has been observed that the system may have numerous coexistence equilibrium points, leading to bi-stable behavior. The fear rate reduces the multiplicity of the equilibrium point and converts the bi-stable situation into a stable case, which stabilizes the system (1) up to the top particular value.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Novel use of XRF in the adsorption processes for the direct analysis of cadmium and silver in absorbent Na-alginate beads
...Show More Authors

         The Na-alginate bead is commonly used in biotechnology fields such as adsorption due to ion exchange between Ca and Na with elements. Scanning electron microscopy (SEM-EDX) has proven to be a comparative method in the detections of these adsorbed elements, but the un-flat forming area of beads that can introduce impossible of the detection of element adsorbed. In contrast, X-ray fluorescence (XRF) documents analysis of elements, direct examination, which may analysis the adsorbents of elements. Here, this Study evaluated the possibility by using XRF for the direct analysis for examples of Cd and Ag in a bench stand. This Study compared this to commonly use

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Aug 31 2024
Journal Name
Iraqi Geological Journal
Microfacies Analysis and Evolution of Porosity of the Albian-Early Cenomanian Mauddud Formation from Selected Wells in Ratawi Oilfield, Southern Iraq
...Show More Authors

Mauddud Formation (Albian stage-the Early Cretaceous) is an important oil reservoir in Ratawi field of southern Iraq. Four wells, R T-2, R T-3, R T-6, and R T-7, located 70 km northwest of Basra, were selected to study microfacies properties and petrophysical associations with the probability of oil production. Seventy-seven core samples are collected, and thin sections for petrographic analysis. The self-potential, Gamma-ray, resistivity, and porosity logs are used to determine the top and bottom of the Mauddud Formation. Water saturation of the invaded and uninvaded zones, shale volume, and porosity were calculated. The study area results showed that the quantity of shale is less than 15% for most of the wells, and the dominant po

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
International Journal Of Research In Social Sciences And Humanities
The Role of Value Chain Analysis as well as Programs and Performance Budget in Reducing Waste of Public Money(Applied Study)
...Show More Authors

Programs and performance budget represents a sophisticated method of public budget numbers, which includes all allocations to be determined for each job or activity within a government entity, which is analyzed according to their needs and costs, and this method can be applied using one of the cost accounting techniques, which is the technique of analyzing the value chain that reduces costs by avoiding activities that do not add value and enhance activities that add value to the economic entity, the current research aims to develop the budget system in government entity by using the budget of programs and performance as a tool for planning and monitoring events and activities, thereby reducing the waste of public money by reducing unnecessa

... Show More
Publication Date
Thu Sep 03 2020
Journal Name
Dissertation
An Economic And Environmental Analysis of the most Factors Affecting of Sustainable Agricultural Development In Iraq Through The Period 2000 -2017
...Show More Authors

Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Electrosorption of Hexavalent Chromium Ions by MnO2/Carbon Fiber Composite Electrode: Analysis and Optimization of the Process by Box-Behnken Design
...Show More Authors

A nano manganese dioxide (MnO2) was electrodeposited galvanostatically onto a carbon fiber (CF) surface using the simple method of anodic electrodeposition. The composite electrode was characterized by field emission scanning electron microscopy (FESEM), and X-ray diffraction (XRD). Very few studies investigated the efficiency of this electrode for heavy metals removal, especially chromium. The electrosorption properties of the nano MnO2/CF electrode were examined by removing Cr(VI) ions from aqueous solutions. NaCl concentration, pH, and cell voltage were studied and optimized using the Box-Behnken design (BDD) to investigate their effects and interactions on the electrosorption process. The results showed that the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using the Financial Analysis of Financial Information Published in the financial Statements for Predicting Stocks returns of Services and Insurance Sectors
...Show More Authors

The aim of this study was to identify the rate of return of the stock through the financial information disclosed by the financial statements of companies both services and insurance included in Iraqi market for securities . The study used a descriptive statistical methods and the correlation matrix for the independent factors , in addition to a regression model for data  analysis and hypothesis . Model included a number of independent variables , which was measured in the size of company (sales or revenue) , and the leverage , in addition to the structure of assets and the book value of owners'  equity in the company , as well as the general price index .Based on the data of (11)companies and for three years, showed the result

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Journal Of Pharmacy Research
Pulsatile drug delivery system-review article
...Show More Authors

Pulsatile drug delivery systems (PDDS) are developed to deliver drug according to circadian behavior of diseases. They deliver the drug at the right time, action and in the right amount, which provides more benefit than conventional dosages and increased patient compliance. The drug is released rapidly and completely as a pulse after a lag time. These systems are beneficial for drugs with chrono-pharmacological behavior, where nighttime dosing is required and for the drugs having a high first-pass effect and having specific site of absorption in the gastrointestinal tract. This article covers methods and marketed technologies that have been developed to achieve pulsatile delivery. Diseases wherein PDDS are promising include asthma, peptic u

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Dewatering System Control by MATLAB Software
...Show More Authors

The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref