This article suggests and explores a three-species food chain model that includes fear effects, refuges depending on predators, and cannibalism at the second level. The Holling type II functional response determines food consumption between stages of the food chain. This study examined the long-term behavior and impacts of the suggested model's essential elements. The model's solution properties were studied. The existence and stability of every probable equilibrium point were examined. The persistence needs of the system have been determined. It was discovered what conditions could lead to local bifurcation at equilibrium points. Appropriate Lyapunov functions are utilized to investigate the overall dynamics of the system. To support the analytical conclusions, numerical simulations were done to validate the model's inferred long-term behavior and to comprehend the implications of the model's significant parameters. © 2023 the author(s).
Researchers have recently increased their focus on the link between autoimmune diseases and infections. Most of the recent research indicates that silent human cytomegalovirus (HCMV), may have diverse roles in the initiation, development, and exacerbation of autoimmune diseases, such as coeliac Disease (CD) and inflammatory bowel disease. The aim of this study is to evaluate the role of HCMV infection in Iraqi patients with CD. Serum samples were obtained from 60 patients with CD, and from 60 healthy subjects. Enzyme-linked immunosorbent assay was used to determine the Anti-Transglutaminase IgG/IgA, Anti-gliadin IgA/ IgG, as well as the HCMV IgM/ IgG levels in the serum samples. Significantly higher percentage of positivity for seru
... Show MoreThe construction industry in Iraq suffers from many problems, perhaps the most important of which is the delay in time and the increase in costs. Therefore, it was necessary to try to adopt a new methodology that would help in overcoming these problems. It was suggested to combine building information modeling with the agile management approach because this technique and methodology is modern and helps in reducing time and cost and improving quality. This paper aims to know the status of using Building Information Modeling (BIM) and Agile Project management (APM) in Iraq and to shed light on the merging of this integration, explaining the benefits, difficulties, and workflow practices, finding the most influencing factors on the tim
... Show MoreBackground: Patients who have both neurological impairment and kyphotic deformity can be treated medically, and this treatment can be achieved with anti-tuberculous drugs alone.
Objective: To evaluate conservative medical management of patients with tuberculosis of the spine (Pott disease). The prognostic significance of various clinical, radiological, and long-term follow-up findings in these patients was also evaluated.
Methods: Between January 2009 and January 2018 data were collected prospectively at The Neurosciences Hospital/ Baghdad/ Iraq in 44 patients with Pott disease in the thoracic and lumbar spine. These patients had no major neurological deficits or
... Show MoreThe present research was conducted to determine the effect of Cadmium Chlori de on the t stes and epididymis of white mice fed with diffl rent concentration (75, 1 00 150 ppm) of this hea y metal for three, ix and nine days. The r ults showed that cadm i um chloride caused s vera! histopathalogical change in testes and epidid mis in luding deg neration and cell necrosis in addition to the appearanc of haemorrh
... Show MoreIn this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).
Simulation of the Linguistic Fuzzy Trust Model (LFTM) over oscillating Wireless Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network
... Show MoreRecently, the development and application of the hydrological models based on Geographical Information System (GIS) has increased around the world. One of the most important applications of GIS is mapping the Curve Number (CN) of a catchment. In this research, three softwares, such as an ArcView GIS 9.3 with ArcInfo, Arc Hydro Tool and Geospatial Hydrologic Modeling Extension (Hec-GeoHMS) model for ArcView GIS 9.3, were used to calculate CN of (19210 ha) Salt Creek watershed (SC) which is located in Osage County, Oklahoma, USA. Multi layers were combined and examined using the Environmental Systems Research Institute (ESRI) ArcMap 2009. These layers are soil layer (Soil Survey Geographic SSURGO), 30 m x 30 m resolution of Digital Elevati
... Show MoreThis paper is an attempt to help the manager of a manufactory to
plan for the next year by a scientific approach, to maximize the profit and آ provide optimal آ monthly quantities of آ production, آ inventory,
work-force, prices and sales. The computer programming helps us to execute that huge number of calculations.
Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show More