Understanding the effects of fear, quadratic fixed effort harvesting, and predator-dependent refuge are essential topics in ecology. Accordingly, a modified Leslie–Gower prey–predator model incorporating these biological factors is mathematically modeled using the Beddington–DeAngelis type of functional response to describe the predation processes. The model’s qualitative features are investigated, including local equilibria stability, permanence, and global stability. Bifurcation analysis is carried out on the temporal model to identify local bifurcations such as transcritical, saddle-node, and Hopf bifurcation. A comprehensive numerical inquiry is carried out using MATLAB to verify the obtained theoretical findings and und
... Show MoreThe study is carried out by using personal dosimeters (film badge). The films are irradiated to absorbed dose of range (0.01-10000 rad). The calibration curves are drawn by using the ordinary method taking into account the filtration effects in three regions (D (Pb/Sn),D(Du),D(300). The calibration films are stored in ambient condition. It is found that the optical density increases, which is attributed to the photodegradation of the films may induce localized states in the energy gap causing increasing in optical absorption, but optical density decreases, which attributed to the photodegradation of the films may cause some cracks at the film surface during the first month, whereas at the rest months we see clear stability in optical d
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreThe study conducted on the compositions of epiphytic diatoms on three taxa of aquatic plants were selected (Phragmites australis Trin ex stand , Ceratophyllum demersum L. and Typha domengensis Pers) in three sites within Al-Auda Marsh, from autumn 2013 to summer 2014 . The study was measured physical and chemical factors of all the study sites, such as: air temperature, power of hydrogen (pH), electrical conductivity (EC), salinity (S‰), total hardness(TH), dissolved oxygen (DO), and plant nutrient. The results showed that water of marsh was oxygenated and it was very hard. A total of 111 taxa of phytoplankton were identified, which belonged to 13 families and 26 genus (one family and two genus of centric diatoms, 12 families and 26 ge
... Show MoreThe research involves using phenol – formaldehyde (Novolak) resin as matrix for making composite material, while glass fiber type (E) was used as reinforcing materials. The specimen of the composite material is reinforced with (60%) ratio of glass fiber.
The impregnation method is used in test sample preparation, using molding by pressure presses.
All samples were exposure to (Co60) gamma rays of an average energy (2.5)Mev. The total doses were (208, 312 and 728) KGy.
The mechanical tests (bending, bending strength, shear force, impact strength and surface indentation) were performed on un irradiated and irrad
... Show MoreResearch aimed to explore the Application Effect of the Conflict Management Strategies by the managements to solve conflict between and inside the conflicted parties within (IGEC) to increase the productivity of the workers. To collect data, 110 questioners had been distributed among managers and heads of departments of all managerial levels, 102 answered questioners regained, 5 of them were disqualify for statistical analytic, only 97 were taking in consideration for statistical analysis presenting 93% of the retained number.
SPSS Program supported with a group of statistical tools, had been used for analysis purposes such as Kronbach Alpha test to assure the validity & stability of the t
... Show MoreObjectives. This study was carried out to quantitatively evaluate and compare the sealing ability of Endoflas by using differentobturation techniques. Materials and Methods. After 42 extracted primary maxillary incisors and canines were decoronated, theircanals were instrumented with K files of size ranging from #15 to #50. In accordance with the obturation technique, the sampleswere divided into three experimental groups, namely, group I: endodontic pressure syringe, group II: modified disposable syringe,and group III: reamer technique, and two control groups. Dye extraction method was used for leakage evaluation. Data wereanalyzed using one-way ANOVA and Dunnett’s T3 post hoc tests. The level of significance was set at p<0:05. Results.
... Show MoreThe inhibition of 3-Benzyl -2-mercaptoquinoizoline -4 (3H)-one (BMQ) on the corrosion of carbon steel in 0.5 M HCl studied by potentionstat polarization methods at 303–333 K. Results obtained show that BMQ act as inhibitor for carbon steel in HCl solution. The inhibition efficiency increase with increase in BMQ concentration. Activation parameters and Gibbs free energy for the adsorption process using Statistical Physics calculated and discussed. Quantum chemical calculations using DFT at the B3LYP/6-31G level of theory were used to calculate some electronic properties of the molecule to verify any correlation between the inhibitive effect and molecular structure of BMQ. The quantum calculations were proceeded to get data around correlati
... Show More