This article suggests and explores a three-species food chain model that includes fear effects, refuges depending on predators, and cannibalism at the second level. The Holling type II functional response determines food consumption between stages of the food chain. This study examined the long-term behavior and impacts of the suggested model's essential elements. The model's solution properties were studied. The existence and stability of every probable equilibrium point were examined. The persistence needs of the system have been determined. It was discovered what conditions could lead to local bifurcation at equilibrium points. Appropriate Lyapunov functions are utilized to investigate the overall dynamics of the system. To support the analytical conclusions, numerical simulations were done to validate the model's inferred long-term behavior and to comprehend the implications of the model's significant parameters. © 2023 the author(s).
The child realize that the meals time provide golden opportunities to get the attention the child needs. However, many difficulties that may appear about eating food can be avoided, if the family used the right way in dealing with this problem. The study aims, in this case, at searching for the reasons that lies behind the child's obstinacy in eating his food and the attempt to study some variables that is related to the research topic.
The results are summed up as follows:
- The number of the sample children is 3 of both sexes between the ages of 3 to 6 years
The objective of the research is to uncover the effect of the strategy of Quranic verses in the collection of science and systemic intelligence for second-grade students. The research sample consisted of (48) students of second grade students in the middle of Al Rasheed Boys School of the second Karkh Directorate, Distribution in the two divisions, Division of (b) and experimental group that studied strategy of Quranic verses, and the Division (a) control group which studied the regular way, and results indicated a statistically significant differences for the experimental group students studied using the strategy Verses in systemic intelligence collection.
In this paper we prove the boundedness of the solutions and their derivatives of the second order ordinary differential equation x ?+f(x) x ?+g(x)=u(t), under certain conditions on f,g and u. Our results are generalization of those given in [1].
Background In rheumatoid arthritis, your immune system attacks the tissue lining the joints on both sides of your body. Other parts of the body may also be affected. Unsure of the exact cause. Two separate genes termed IL12A (p35) and IL12 encode the heterodimeric cytokine known as IL12 (p40). Several different hematopoietic cell types can have several different hematopoietic cell types that can generate antigen-presenting cells (APCs), including DCs and macrophages. Objectives This study aimed to investigate if the interleukin IL-12B gene's common polymorphisms in an Iraqi population were associated with RA. Material and methods Blood samples were taken from 70 Iraqi patients with RA illnesses and 30 Iraqi controls during the periods from
... Show More
Background: Diabetes mellitus is a chronic disease with an increasing prevalence worldwide and characterized by an increase in oxidative stress and inflammation. The most important factor that is responsible for oxidative stress and production of reactive oxygen species (ROS) is hyperglycemia. The major targets of ROS are proteins. The most common and widely used biomarker of severe oxidative protein damage is protein carbonyl content.
The study was designed to assess the serum level of protein carbonyl as a marker of protein oxidation in patients with type 2 diabetes mellitus and to evaluate the effect of age, body weight, waist circumference, diabetic control and disease duration on the level
... Show MoreBackground: Insulin resistance is associated with metabolic syndrome , type 2 diabetes and representing a risk factor for cardiovascular disease . This relationship may be modulated to some extent by age related changes in sex hormone status.. In particular, reduced total testosterone (TT) levels have been associated with insulin resistance and subsequent risk for developing type 2 diabetes. Aim of study: we examined whether low total testosterone level were associated with insulin resistance in young adult men. Methods: a total of 83 men (young adult men) divided into 2 group : (group1 ) 49 men with a risk factor for insu
... Show MoreBackground: It is well-known that silicon oil (SO) injection into the vitreous cavity after pars plana vitrectomy is usually associated with high intraocular pressure.
Objectives: To determine the influence of silicon oil (SO) removal on IOP level after pars plana vitrectomy for spontaneous rhegmatogenous retinal detachment (RRD)
Subjects and Methods: A prospective study was conducted at Ibn Al-Haitham eye teaching hospital, Baghdad- Iraq. Intraocular pressure (IOP) was measured pre and post SO removal in patients who have underwent retinal detachment surgery with SO injection of 1000 centistokes (cSt) viscosity. Baseline IOP was measured for all the patient before the SO
... Show MoreProfit is a goal sought by all banks because it brings them income and guarantees them survival and continuity, and on the other hand, facing commitments without financial crisis. Hence the idea of research in his quest to build scientific tools and means that can help bank management in particular, investors, lenders and others to predict financial failure and to detect early financial failures. The research has produced a number of conclusions, the most important of which is that all Islamic banks sample a safe case of financial failure under the Altman model, while according to the Springate model all Islamic banks sample a search for a financial failure except the Islamic Bank of Noor Iraq for Investment and Finance )BINI(. A
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show More