Using a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were specified. The circumstances of local bifurcation that could take place close to the equilibrium points were discovered. Numerical simulations were run to validate the model's obtained long-term behavior and comprehend the effects of the model's key parameters in order to confirm our analytical conclusions. It has been observed that the system may have numerous coexistence equilibrium points, leading to bi-stable behavior. The fear rate reduces the multiplicity of the equilibrium point and converts the bi-stable situation into a stable case, which stabilizes the system (1) up to the top particular value.
This work presents the modeling of the electrical response of monocrystalline photovoltaic module by using five parameters model based on manufacture data-sheet of a solar module that measured in stander test conditions (STC) at radiation 1000W/m² and cell temperature 25 . The model takes into account the series and parallel (shunt) resistance of the module. This paper considers the details of Matlab modeling of the solar module by a developed Simulink model using the basic equations, the first approach was to estimate the parameters: photocurrent Iph, saturation current Is, shunt resistance Rsh, series resistance Rs, ideality factor A at stander test condition (STC) by an ite
... Show MoreThe increasing number of orphans and their organizations and institutes in our community makes it increasingly important to design and develop an expert system that supports decisions concerning orphans and their families. This system can be used by any orphans organization to facilitate its work.
The proposed work is designed to manage the Orphans and Families of Martyrs of Terrorism Expert System (OFMTES) by registry all information about all orphans to display mostly orphan deserves bill, data is entered for each orphan, and with each entry a counter is increased according to this input information; the output result represents the score for that orphan. Different orphans have different scores. Coloring is used to know the degree o
The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreThis research seeks through the adoption of two basic variables, where he considered the actuarial experience as an independent variable, while the process of accepting the risk and dimensions related to it is a dependent variable, the research was adopted to present the data achieved by the company during the life insurance business during the adoption of actuarial experience at the beginning of its work where Adoption of the historical method in the analysis of those data to prove the researcher's opinion, through the analysis of data (5 years) for the first period, which extends between (1975-1979), the period during which the company adopted the actuarial experience at the time, also taken data for the same dimensions related to the
... Show MoreThe study area comprises Injana Formation (Late Miocene), exposed on the hills nearby of Tharthar Lake and about 120 km north of Baghdad city. This study depends on sedimentologic and facies analysis to recognize paleoenvironment and recognize the kinds of vertebrate bone fossils during Late Miocene. Sedimentologic and facies analysis showed many sedimentary facies: facies (Se) of scoured erosional surface, facies of (Sp) cross- bedded sandstones, facies (Fs) of fine sandstone facies, facies of (Fc) claystone, and facies of (C) calcareous clay. Facies analysis referred to the sub environments which are: point bar, over bank and floodplain in addition to fining upward cycles of deposition, which refers to meandering flu
... Show MoreResin-modified glass ionomer cement tends to shrink due to polymerization of the resin component. Additionally, they are more prone to syneresis and imbibition during the setting process. This
With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreIn this paper, some relations between the flows and the Enveloping Semi-group were studied. It allows to associate some properties on the topological compactification to any pointed flows. These relations enable us to study a number of the properties of the principles of flows corresponding with using algebric properties. Also in this paper proofs to some theorems of these relations are given.