This article suggests and explores a three-species food chain model that includes fear effects, refuges depending on predators, and cannibalism at the second level. The Holling type II functional response determines food consumption between stages of the food chain. This study examined the long-term behavior and impacts of the suggested model's essential elements. The model's solution properties were studied. The existence and stability of every probable equilibrium point were examined. The persistence needs of the system have been determined. It was discovered what conditions could lead to local bifurcation at equilibrium points. Appropriate Lyapunov functions are utilized to investigate the overall dynamics of the system. To support the a
... Show MoreThe fish assemblage in the East Hammar marsh was studied during December 2009 to May 2010. The fish fauna of the marsh consisted of 17 native, 23 marine (49%) and seven alien species. The dominant species were Liza abu (14.6%), Carassius auratus (13.4%) and Thryssa mystax (11.2%). The resident species formed 44.7%, occasional species 36.1% and seasonal species 19.2% of the total number of fish species. Fish species diversity index ranged from 1.28 to 2.61, richness from 1.98 to 4.50 and evenness from 0.45 to 0.78. Salinity ranged from 1.45 to 7.74‰. The increase in the proportion of marine species (49%) in the fish assemblage due to marine waters progress from Arabian Gulf had an impact on the values of ecological indices and the
... Show MoreThe Semitic Languages have her its Articulatory That what we attend to discuss In this Research to Represent the Relation Between them and the Light Of Semitics a Comparative Studies where ever It's Exists The Semitic languages by comparing the words whish most Semitic languages share with each other. We call such Words the Semitic denominator. We have adopted a comparative framework in our Research, which is based on comparing an Arabic word with its Semitic counterpart in Order to identify the forms that control grammatical change in both language
... Show MoreThe risk assessment for three pipelines belonging to the Basra Oil Company (X1, X2, X3), to develop an appropriate risk mitigation plan for each pipeline to address all high risks. Corrosion risks were assessed using a 5 * 5 matrix. Now, the risk assessment for X1 showed that the POF for internal corrosion is 5, which means that its risk is high due to salinity and the presence of CO, H2S and POF for external corrosion is 1 less than the corrosion, while for Flowline X2 the probability of internal corrosion is 4 and external is 4 because there is no Cathodic protection applied due to CO2, H2S and Flowline X3 have 8 leaks due to internal corrosion so the hazard rating was very high 5 and could be due to salinity, CO2, fluid flow rate
... Show Moreis divided into two chapter:Chapter one to ensure asyslematic framework for research amd included aresearch problem and also inchuded on the importance of research and the need for him as well as to clarify. The second chapter inchuded a theoretical framework: theoretical framework has been divided into two section. The first topic: poetics transformations The second topic: poetics and scale of rheloric in the film After the comp of the theoretical framework; so the researcher analyzed the film (Antichrist) has arrived ataset of resuits was including
This investigation was undertaken to evaluate the effectiveness of using Hydrated lime as a (partial substitute) by weight of filler (lime stone powder) with five consecutive percentage namely (1.0, 1.5, 2.0, 2.5, 3.0) % by means of aggregate treatment, by introducing dry lime on dry and 2–3% Saturated surface aggregate on both wearing and binder coarse. Marshall design method, indirect tensile test and permanent deformation under repeated loading of Pneumatic repeated load system at full range of temperature (20, 40, 60) C0 were examined The study revealed that the use of 2.0% and 1.5 % of dry and wet replacement extend the pavement characteristics by improving the Marshall properties and increasing the TSR%. Finally, increase permanent
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreThe danger of the attacks of 9/11 in America, mainly on the WorldTrade Center at Ground Zero, had brought America into a position thatnever seen before. People who lived there faced a historical calamity marked a turning point in history and a beginning of a new era. Thepaper examines the behavior of traumatized individuals in relation tosociety that trauma involves both. The socio cultural approach willachieve the goal. It studied the responses of the individuals to the event and the motives behind these reactions. Don DeLillo, a member of apost 9/11 group of writers, an American novelist of Italian origin, through his portrayal of the characters, tries to present a vivid image t
... Show More