Preferred Language
Articles
/
4hZJrooBVTCNdQwCQqLh
Three-species food chain model with cannibalism in the second level
...Show More Authors

This article suggests and explores a three-species food chain model that includes fear effects, refuges depending on predators, and cannibalism at the second level. The Holling type II functional response determines food consumption between stages of the food chain. This study examined the long-term behavior and impacts of the suggested model's essential elements. The model's solution properties were studied. The existence and stability of every probable equilibrium point were examined. The persistence needs of the system have been determined. It was discovered what conditions could lead to local bifurcation at equilibrium points. Appropriate Lyapunov functions are utilized to investigate the overall dynamics of the system. To support the analytical conclusions, numerical simulations were done to validate the model's inferred long-term behavior and to comprehend the implications of the model's significant parameters. © 2023 the author(s).

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Eastern Journal Of Medicine
The role of Human Cytomegalovirus (HCMV) in Patients with Active Coeliac Disease (CD)
...Show More Authors

Researchers have recently increased their focus on the link between autoimmune diseases and infections. Most of the recent research indicates that silent human cytomegalovirus (HCMV), may have diverse roles in the initiation, development, and exacerbation of autoimmune diseases, such as coeliac Disease (CD) and inflammatory bowel disease. The aim of this study is to evaluate the role of HCMV infection in Iraqi patients with CD. Serum samples were obtained from 60 patients with CD, and from 60 healthy subjects. Enzyme-linked immunosorbent assay was used to determine the Anti-Transglutaminase IgG/IgA, Anti-gliadin IgA/ IgG, as well as the HCMV IgM/ IgG levels in the serum samples. Significantly higher percentage of positivity for seru

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Investigation the Opportunity of BIM with Agile Management Approach in Iraqi Construction Projects
...Show More Authors

The construction industry in Iraq suffers from many problems, perhaps the most important of which is the delay in time and the increase in costs. Therefore, it was necessary to try to adopt a new methodology that would help in overcoming these problems. It was suggested to combine building information modeling with the agile management approach because this technique and methodology is modern and helps in reducing time and cost and improving quality. This paper aims to know the status of using Building Information Modeling (BIM) and Agile Project management (APM) in Iraq and to shed light on the merging of this integration, explaining the benefits, difficulties, and workflow practices, finding the most influencing factors on the tim

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Fri Sep 01 2017
Journal Name
Iosr Journal Of Pharmacy And Biological Sciences(iosr-jpbs)
Histopathological study in the spleen of Albino Mice treated with glucosamine sulfate drug
...Show More Authors

View Publication
Publication Date
Tue Jun 11 2019
Journal Name
Al-kindy College Medical Journal
Conservative Treatment of Tuberculosis of the Spine in Patients with no Neurological Deficits
...Show More Authors

Background: Patients who have both neurological impairment and kyphotic deformity can be treated medically, and this treatment can be achieved with anti-tuberculous drugs alone.

Objective: To evaluate conservative medical management of patients with tuberculosis of the spine (Pott disease). The prognostic significance of various clinical, radiological, and long-term follow-up findings in these patients was also evaluated.

Methods: Between January 2009 and January 2018 data were collected prospectively at The Neurosciences Hospital/ Baghdad/ Iraq in 44 patients with Pott disease in the thoracic and lumbar spine. These patients had no major neurological deficits or

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 26 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Hislopathalogical Changes in the Testes and Epididymis of Mice Fed with Cadmium Chloride
...Show More Authors

The  present   research   was  conducted   to  determine   the  effect  of Cadmium   Chlori de  on  the  t  stes  and  epididymis  of  white  mice  fed with  diffl rent  concentration     (75,  1 00 150  ppm)  of this hea  y metal for three,   ix and nine days. The r   ults showed  that cadm i um chloride caused   s  vera!  histopathalogical  change in  testes  and  epidid   mis in  luding deg  neration and cell necrosis  in addition  to the appearanc of  haemorrh

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Secure communications by chaotic carrier signal using Lorenz model
...Show More Authors

In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Linguistic Fuzzy Trust Model over Oscillating Wireless Sensor Networks
...Show More Authors

Simulation  of  the  Linguistic  Fuzzy Trust  Model  (LFTM)  over  oscillating  Wireless  Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 02 2017
Journal Name
Journal Of Engineering
Estimation Curve Numbers using GIS and Hec-GeoHMS Model
...Show More Authors

Recently, the development and application of the hydrological models based on Geographical Information System (GIS) has increased around the world. One of the most important applications of GIS is mapping the Curve Number (CN) of a catchment. In this research, three softwares, such as an ArcView GIS 9.3 with ArcInfo, Arc Hydro Tool and Geospatial Hydrologic Modeling Extension (Hec-GeoHMS) model for ArcView GIS 9.3, were used to calculate CN of (19210 ha) Salt Creek watershed (SC) which is located in Osage County, Oklahoma, USA. Multi layers were combined and examined using the Environmental Systems Research Institute (ESRI) ArcMap 2009. These layers are soil layer (Soil Survey Geographic SSURGO), 30 m x 30 m resolution of Digital Elevati

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Mathematical Model for One Year Planning of a Manufactory
...Show More Authors

This paper is an attempt to help the manager of a manufactory to

plan for the next year by a scientific approach, to maximize the profit and Ø¢ provide optimal Ø¢ monthly quantities of Ø¢ production, Ø¢ inventory,

work-force, prices and sales. The computer programming helps us to execute that huge number of calculations.

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Crossref