This article suggests and explores a three-species food chain model that includes fear effects, refuges depending on predators, and cannibalism at the second level. The Holling type II functional response determines food consumption between stages of the food chain. This study examined the long-term behavior and impacts of the suggested model's essential elements. The model's solution properties were studied. The existence and stability of every probable equilibrium point were examined. The persistence needs of the system have been determined. It was discovered what conditions could lead to local bifurcation at equilibrium points. Appropriate Lyapunov functions are utilized to investigate the overall dynamics of the system. To support the analytical conclusions, numerical simulations were done to validate the model's inferred long-term behavior and to comprehend the implications of the model's significant parameters. © 2023 the author(s).
Biofilms formation by pathogens microbial Control considered important in medical research because it is the hazarded virulence factor leading to becoming difficult to treat because of its high resistance to antimicrobials. Glycopeptide antibiotic a (Vancomycin) and the commercial bacteriocin (Nisin A) were used to comparative with purification bacteriocin (MRSAcin) against MRSA biofilm. One hundred food samples were collected from Baghdad markets from July 2016 to September 2016, including (cheese, yogurt, raw milk, fried meat, grilled meat, and beef burger). All samples were cultures; S. aureus was confirmation by macroscopic culture and microscopic examination, in addition to biochemical tests. Methicillin resistance S. asureus (
... Show MoreAbstract:
Saudi Arabia and United States long relation could present an important
subject to understand alliance kind in international relations types. We trying
in this study to diagnose and analyze the Saudi Arabia and United States
model to find balance and unbalance statues and its influence on the
directions of Saudi Arabia foreign policy positions.
We divided the study in two parts, each part have many sections. The
first part deal with the historian emergence of Saudi Arabia state and its
development in three stages including its foreign relations with regions and
international powers. While the second part was dedicated in analyzing and
understanding the mechanism and active facts that drawing the Sa
Five fish species were collected from Tigris river at Al-Adhamiyah region, Baghdad during the period from September to December 2011. These fishes were examined for ectoparasites. They were infected with 13 species of parasites which included one species of ciliated protozoans and 12 species of monogeneans. Among such parasites, Ligophorus imitans Euzet et Suriano, 1977 is reported for the first time in Iraq. In addition, eight new host records in Iraq were reported in the present study.
Abstract
The study aims to reveal the level of inclusion of citizenship values in the English language textbooks (We Can) series for elementary education in the Kingdom of Saudi Arabia. To achieve this objective, the "content analysis" methodology was used. A content analysis card was designed to include (6) main areas of citizenship values, it consisted of (28) sub-indicators of citizenship values that were supposed to be included in the English language textbook series (We Can) for elementary education. The study sample consisted of all the English language textbooks (We Can) series for elementary education, which consisted of (6) textbooks, two for each class. The results of the study indicated that there is a
... Show MoreAs a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put
... Show MoreThis paper deals with modelling and control of Euler-Bernoulli smart beam interacting with a fluid medium. Several distributed piezo-patches (actuators and/or sensors) are bonded on the surface of the target beam. To model the vibrating beam properly, the effect of the piezo-patches and the hydrodynamic loads should be taken into account carefully. The partial differential equation PDE for the target oscillating beam is derived considering the piezo-actuators as input controls. Fluid forces are decomposed into two components: 1) hydrodynamic forces due to the beam oscillations, and 2) external (disturbance) hydrodynamic loads independent of beam motion. Then the PDE is discretized usi
Many production companies suffers from big losses because of high production cost and low profits for several reasons, including raw materials high prices and no taxes impose on imported goods also consumer protection law deactivation and national product and customs law, so most of consumers buy imported goods because it is characterized by modern specifications and low prices.
The production company also suffers from uncertainty in the cost, volume of production, sales, and availability of raw materials and workers number because they vary according to the seasons of the year.
I had adopted in this research fuzzy linear program model with fuzzy figures
... Show MoreThis paper presents a grey model GM(1,1) of the first rank and a variable one and is the basis of the grey system theory , This research dealt properties of grey model and a set of methods to estimate parameters of the grey model GM(1,1) is the least square Method (LS) , weighted least square method (WLS), total least square method (TLS) and gradient descent method (DS). These methods were compared based on two types of standards: Mean square error (MSE), mean absolute percentage error (MAPE), and after comparison using simulation the best method was applied to real data represented by the rate of consumption of the two types of oils a Heavy fuel (HFO) and diesel fuel (D.O) and has been applied several tests to
... Show MoreA Genetic Algorithm optimization model is used in this study to find the optimum flow values of the Tigris river branches near Ammara city, which their water is to be used for central marshes restoration after mixing in Maissan River. These tributaries are Al-Areed, AlBittera and Al-Majar Al-Kabeer Rivers. The aim of this model is to enhance the water quality in Maissan River, hence provide acceptable water quality for marsh restoration. The model is applied for different water quality change scenarios ,i.e. , 10%,20% increase in EC,TDS and BOD. The model output are the optimum flow values for the three rivers while, the input data are monthly flows(1994-2011),monthly water requirements and water quality parameters (EC, TDS, BOD, DO and
... Show More