Preferred Language
Articles
/
1RY-vooBVTCNdQwCS6QQ
Modeling and analysis of a prey-predator system incorporating fear, predator-dependent refuge, and cannibalism
...Show More Authors

Using a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were specified. The circumstances of local bifurcation that could take place close to the equilibrium points were discovered. Numerical simulations were run to validate the model's obtained long-term behavior and comprehend the effects of the model's key parameters in order to confirm our analytical conclusions. It has been observed that the system may have numerous coexistence equilibrium points, leading to bi-stable behavior. The fear rate reduces the multiplicity of the equilibrium point and converts the bi-stable situation into a stable case, which stabilizes the system (1) up to the top particular value.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
An approximate solution for solving linear system of integral equation with application on "Stiff" problems
...Show More Authors

An approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly

View Publication Preview PDF
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Sat Nov 03 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Construction of an Initial Assessment Documentation Tool for Nursing Recording System in Coronary Care Units
...Show More Authors

Objective : The study was carried out to construct an initial assessment documentation tool for nursing
recording system in Coronary Care Unit.
Methodology : A descriptive, purposive sample of (65) nurses was selected from CCU of main
teaching hospitals (Al Karama, Al Kindy, Al Kadimia, Al Yarmmok, Baghdad teaching hospital, Ibn
Al Naffis hospital) and Ibn-Al betar hospital in Baghdad city from the 15th of April 2004 to the 15th of
April 2006.
The instrument was constructed and comprised of two sections: section one included the
nurses' demographic characteristic; section two was the initial assessment documentation tool that
contained (2) parts including: General information form and the initial assessment form.

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Calculation of Lambda Doubling for 7LiH1 molecule Using the System band emission for electronic transmissions
...Show More Authors

The A2?u-X1?g+ emission band system of 7LiH1 molecule has been calculated for Lambda doubling. The relation between wave number ?p , ?Q , ?R conducted the energies of the state of rotation F (J), and (J + 1) with rotational quantum number J, respectively, of 7LiH1 molecule for statehood A2?u using the rotation, fixed vibrational states of both the ground and raised crossovers vibrational against ???= 0 to V ' = 0-4using rotational levels J = 0 to J = 20 have found.

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Using Adaptive Neuro Fuzzy Inference System to Predict Rate of Penetration from Dynamic Elastic Properties
...Show More Authors

Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal.  The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 13 2020
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
Robust Approach of Optimal Control for DC Motor in Robotic Arm System using Matlab Environment
...Show More Authors

Modern automation robotics have replaced many human workers in industrial factories around the globe. The robotic arms are used for several manufacturing applications, and their responses required optimal control. In this paper, a robust approach of optimal position control for a DC motor in the robotic arm system is proposed. The general component of the automation system is first introduced. The mathematical model and the corresponding transfer functions of a DC motor in the robotic arm system are presented.  The investigations of using DC motor in the robotic arm system without controller lead to poor system performance. Therefore, the analysis and design of a Proportional plus Integration plus Divertive (PID) controller is illustrated.

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
The Mark transformation of the Visual Display System in the Children's Theater: رامي سامح زكي
...Show More Authors

    The mark at the Children's Theater did not receive as much attention as in the adult theater, despite the great attention given to its visual system, but some of the directors of the Children's Theater approached the application of the same system of marking in the adult theater, without limiting  a certain mechanism  that identifies the mechanisms of mark operation and the modalities of its transformation in the visual display system, which called on the  researcher to shed light in this study on the scientific shift in the visual display system and its functions in the children's theater. The researcher formulated a title for his research (the mark transformation of the visual display system in the chi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-nahrain Journal Of Science
Spectrophotometric Determination of Co(II) in Vitamin B12 Using2-(biphenyl-4-yl)-3-((2-(2,4-dinitrophenyl) hydrazono)methyl) imidazo [1,2-a]pyridine as Ligand by Flow Injection–Merging Zone Analysis
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Thu Jan 10 2019
Journal Name
Journal Of The College Of Education For Women
Spatial analysis of population growth in the district of Tuz Khurmatu for (1977-2012)
...Show More Authors

The study population growth of the most important demographic phenomena upon which planners to meet changes in the size of the population increase is through knowledge of the requirements of population growth can be planned for the future. On this basis, Tuz District was chosen for the study of population growth, which set her period (1977-2012), and compared with the growth of the population of the province and the extent of the variation in population growth, according to the administrative units, has touched search numerical and proportional distribution of the population according to the administrative aspects of the judiciary, as well as environmental distribution.

The elimination of the study population growth dramatically

... Show More
View Publication Preview PDF