This article suggests and explores a three-species food chain model that includes fear effects, refuges depending on predators, and cannibalism at the second level. The Holling type II functional response determines food consumption between stages of the food chain. This study examined the long-term behavior and impacts of the suggested model's essential elements. The model's solution properties were studied. The existence and stability of every probable equilibrium point were examined. The persistence needs of the system have been determined. It was discovered what conditions could lead to local bifurcation at equilibrium points. Appropriate Lyapunov functions are utilized to investigate the overall dynamics of the system. To support the analytical conclusions, numerical simulations were done to validate the model's inferred long-term behavior and to comprehend the implications of the model's significant parameters. © 2023 the author(s).
Research Objectives: The research aims to highlight the approach of Imam Al-Qaradawi in contemporary jurisprudence in the recent issues of the jurisprudence of minorities, and mentioning the foundations of jurisprudence of minorities, along with some of the practical applications of Imam Al-Qaradawi.
Study Methodology: The researcher applied the inductive, analytical and comparative approach by tracking the scientific material related to the subject of the study from the books of Al-Qaradawi in the first place, then by comparing the legal provisions with what had been stated in the four schools of jurisprudence.
Findings: The interest and need of Muslim minorities in non-
... Show MoreThis study examines the species composition, biodiversity, zoogeography, and ecology of freshwater gastropods of 12 springs in Andijan region of Uzbekistan. The study used generally accepted malacological, faunistic, ecological, analytical, and statistical methods. As a result of research in the springs, 14 species of freshwater gastropods belonging to 2 subclasses, 5 families, and 10 genera were recorded. 7 of them are endemic to Central Asia. When indicators of biodiversity of mollusks were analyzed according to the Shannon index, it was found that the highest value was recorded in the springs besides the hills. According to the biotope of distribution and bioecological features, they were divided into cryophilic, phytophilic, pelophil
... Show MoreThe aim of this study is to utilize the behavior of a mathematical model consisting of three-species with Lotka Volterra functional response with incorporating of fear and hunting cooperation factors with both juvenile and adult predators. The existence of equilibrium points of the system was discussed the conditions with variables. The behavior of model referred by local stability in nearness of any an equilibrium point and the conditions for the method of approximating the solution has been studied locally. We define a suitable Lyapunov function that covers every element of the nonlinear system and illustrate that it works. The effect of the death factor was observed in some periods, leading to non-stability. To confirm the theore
... Show MoreCoronavirus disease (COVID-19) is an acute disease that affects the respiratory system which initially appeared in Wuhan, China. In Feb 2019 the sickness began to spread swiftly throughout the entire planet, causing significant health, social, and economic problems. Time series is an important statistical method used to study and analyze a particular phenomenon, identify its pattern and factors, and use it to predict future values. The main focus of the research is to shed light on the study of SARIMA, NARNN, and hybrid models, expecting that the series comprises both linear and non-linear compounds, and that the ARIMA model can deal with the linear component and the NARNN model can deal with the non-linear component. The models
... Show MoreThe problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.
Purpose: To identify the size of the food gap for the main agricultural products and crops in Iraq, which reflects to us the extent to which agricultural production in particular and the agricultural sector in general have declined.Theoretical framework: The theoretical side of the research dealt with the definition of self-sufficiency and the food gap, as well as identifying the reality of agricultural production in Iraq during the study period, as well as the reality of the food gap for the most important agricultural, plant and animal products.Design/methodology/approach: In reviewing the research problem, the researcher adopted the method of deductive and descriptive analysis based on the presentation and detail of official data
... Show MoreBackground: The apical seal is the single most important factor in determining the success of surgical endodontics, the aim of this study was to compare the sealing ability of Mineral Trioxide Aggregate in three different cavity designs. Materials and Methods: Thirty extracted human single-rooted teeth were divided into three groups of ten teeth per group, a retrograde cavity preparation was carried out using a low speed handpiece and round bur with parallel walls in the first group, ultrasonic retrotip and unit in the second group and a low speed handpiece with a carbide inverted cone bur with undercuts in the third group, all the cavities were filled with MTA. microleakage was measured by dye penetration technique using methylene blue. Re
... Show MoreThe shape dimensions and characteristics of pollen grains and seeds have importance in distinguish among species. Therefore, the present study included morphological characteristics of pollen grains and seeds for eight species belonging to eight genera of the family Brassicaceae and these species are: Alliaria petiolata (M.Bieb) Cavara et Grand, Aubrieta parviflora Boiss, Cardamine hirsuta L., Crambe orientalis L., Eromobium aegyptiacum (Spreng.) Schweinf.et Asch.ex Boiss., Parlatoria cakiloidea Boiss., Sterigmostemum sulphureum (Banksetsol.) Bornm. Neotorularia torulosa (Desf.) Hedge & J. Leonard. The pollen grains were studied in morphological and full measurements were taken, the study showed that the majority of the pollen grai
... Show MoreCryptosporidium is a protozoan parasite of medical and veterinary significance that causes gastroenteritis in a number of vertebrate hosts. Several studies have recorded different degrees of pathogenicity and virulence among Cryptosporidium species and isolates of the same species as well as evidence of variation in host susceptibility to infection. Nevertheless, important progress has been made in determining Cryptosporidium's putative virulence factors. Since the publication of C parvum and C. Hominis this development has been accelerated genomes, identified by a range of immunological and molecular techniques with the characterization of over 25 putative virulence factors, which are proposed to be involved in aspects of host-pat
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More