In this paper a prey-predator-scavenger food web model is proposed and studied. It is assumed that the model considered the effect of harvesting and all the species are infected by some toxicants released by some other species. The stability analysis of all possible equilibrium points is discussed. The persistence conditions of the system are established. The occurrence of local bifurcation around the equilibrium points is investigated. Numerical simulation is used and the obtained solution curves are drawn to illustrate the results of the model. Finally, the nonexistence of periodic dynamics is discussed analytically as well as numerically.
some ecological (physical and chemical varible) of water samples were studies monthly from December 2008 to May 2009 at two stations( St.1) Al - Chibayesh marsh and (St.2) Abu – Zirik marsh which are located in the south of Iraq . These variables included : Temperature, pH, EC, Dissolved oxygen , Total alkalinity, Nitrate, Sulphate, and phosphate, Si-SiO2 and Ca ,Mg, Cl, The marsh Considered as fresh water and alkaline. Abu-Zirik less than Al-Chibayesh.
This research means a study (the impact of the Arab-Islamic environment on contemporary painting, the artist Abd al-Rahman al-Suleiman as a model). The research falls into two axes: the first: the theoretical axis, and the second: the applied axis. The first axis dealt with an introduction that contained: (the research problem, its importance, its goal, its limits, and the definition of terms). This research aims to uncover (the impact of the Arab-Islamic environment on contemporary painting, and the artist Suleiman was a model). And the research limits spatially: Saudi Arabia, and temporally: 2010-2014. This theme included two topics: The first: the characteristics of the Saudi environment and its impact on art. The second: the s
... Show MorePurpose: The research aims to explore the impact Business Intelligence System (BIS) and Knowledge Conversion Processes (KCP) in the Building Learning Organization (LO) in KOREK Telecom Company in Baghdad city.
Design/methodology/approach: in order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then has tested the search in the telecommunications sector, representatives of one of the telecommunications companies in Baghdad city, has therefore chosen KOREK Telecom company as a sample for research, and the choice was based on the best standard international companies to serve mobile communications in terms o
... Show MoreThe aim of this study is to identify the effect of enabling the effectiveness of the work of the audit committees in private commercial banks and to identify the extent of awareness of the importance of empowerment in the work of these committees, especially as it is known that these committees, especially the inspection committees that go to private banks and from various sources including committees of the Central Bank of Iraq Committees of the Securities Commission and finally committees of the external audit offices, through an analysis of the determinants of empowerment in the performance of the most important work of the audit committees, namely: supervising the process of preparing reports, supervising the system of intern
... Show MoreThe aims of the research is to know the role of Organisational learning in building talent management strategies in the Ministry of Science and Technology , where we see the challenges facing organizations today dictate now and in the future activation of scientific expertise to meet these challenges and the dissemination of these concepts within the priorities and data organizational culture of these organizations despite having a lot of the importance of organizational knowledge and learning applications .Despite learning and adopting some of the organizations have to enhance their competitiveness, we find a lot of organizations, including (The ministry researched) still do not realize the importance of the role of organization
... Show MoreThe primary function of commercial banks is the process of converting liquid liabilities such as deposits to illiquid assets, (also known as a loan), liquid assets, (aka cash and cash equivalent) in a balanced manner between liquid and illiquid assets, that guaranteed the preservation of the rights of depositors and the bank and not by converting liquid liabilities into liquid assets in a very large percentage. This comes from its role as depository and intermediary institutions between supply and demand, therefore, we find that the high indicators of bank liquidity and solvency may reflect a misleading picture of the status of commercial banks, to some extent in terms of the strength of their balance sheets and
... Show MoreAcute myeloid leukemia (AML) represents the most prevalent type of acute leukemia in adults and is responsible for approximately 80% of all cases. The tumor suppressor gene (TP53) is a gene that has been frequently studied in cancer, and mutations in this gene account for about 50% of human cancers. This study aims to evaluate the correlation between two single nucleotide polymorphisms (SNPs) in the gene: rs1042522 and rs1642785, and a group of Iraqi patients suffering from pre-diagnostic acute myeloid leukemia (AML). Blood samples were collected from sixty patients (26 males and 34 females) and sixty controls (26 males and 34 females); these subjects were matched in gender, age, and ethnicity. Genomic DNA has been extracted fro
... Show MorePolish Academy of Sciences
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More