Preferred Language
Articles
/
9hcHeo0BVTCNdQwCYxTp
Fear and Hunting Cooperation's Impact on the Eco-Epidemiological Model's Dynamics
...Show More Authors

Due to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and cooperative hunting is built and examined. It is considered that the disease in the predator is of the SIS kind, which means that the infected predator can recover and become susceptible through medical treatment. All possible equilibrium points have been found. The solution's positivity and boundedness are examined. Local and global stability analyses are performed. The uniform persistence conditions are established. The local bifurcation around the equilibrium points is studied. Finally, numerical simulation is performed to validate the obtained results and comprehend the parameter impact on system dynamics.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Oct 01 2009
Journal Name
Journal
Perniosis: clinical and epidemiological study in Iraqi patients
...Show More Authors

AN Adil A, F Basman M, 2009

View Publication
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Epidemiological Complex Networks: A Survey
...Show More Authors

     In this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of soc

... Show More
Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Epidemiological Complex Networks: A Survey
...Show More Authors

     In this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of soc

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 10 2022
Journal Name
Mathematics
Modeling and Analysis of the Influence of Fear on the Harvested Modified Leslie–Gower Model Involving Nonlinear Prey Refuge
...Show More Authors

Understanding the effects of fear, quadratic fixed effort harvesting, and predator-dependent refuge are essential topics in ecology. Accordingly, a modified Leslie–Gower prey–predator model incorporating these biological factors is mathematically modeled using the Beddington–DeAngelis type of functional response to describe the predation processes. The model’s qualitative features are investigated, including local equilibria stability, permanence, and global stability. Bifurcation analysis is carried out on the temporal model to identify local bifurcations such as transcritical, saddle-node, and Hopf bifurcation. A comprehensive numerical inquiry is carried out using MATLAB to verify the obtained theoretical findings and und

... Show More
View Publication
Scopus (21)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu May 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Restrained Edges Effect on the Dynamics of Thermoelastic Plates under Different End Conditions
...Show More Authors

Frequency equations for rectangular plate model with and without the thermoelastic effect for the cases are: all edges are simply supported, all edges are clamped and two opposite edges are clamped others are simply supported.   These were obtained through direct method for simply supported ends using Hamilton’s principle with minimizing Ritz method to total energy (strain and kinetic) for the rest of the boundary conditions. The effect of restraining edges on the frequency and mode shape has been considered. Distributions temperatures have been considered as a uniform temperature the effect of developed thermal stresses due to restrictions of ends conditions on vibration characteristics   of a plate with different

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Coloproctology
Epidemiological and prognostic single center study of anal carcinoma
...Show More Authors
Abstract<p> Background Anorectal carcinoma includes the anal margin, the anal canal, and the lower rectum. The incidences of anal tumors represent 1.4 % of all gastrointestinal tumors.</p><p> Patients and methods Our study is retrospective and was conducted at Baghdad Medical City. Patient’s data were collected from the medical records through a predesigned sheet that included the following information: demographic data, medical history, past-history, presenting symptoms, pathological data, and treatment details.</p><p> Results The median age was 49 years. As regard tumor extension, 85.71 % of patients had anal disease, while anorectal cancer was encount</p> ... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Thu Aug 08 2024
Journal Name
Computation
Evaluation of the Dynamics of Psychological Panic Factor, Glucose Risk and Estrogen Effects on Breast Cancer Model
...Show More Authors

Contracting cancer typically induces a state of terror among the individuals who are affected. Exploring how glucose excess, estrogen excess, and anxiety work together to affect the speed at which breast cancer cells multiply and the immune system’s response model is necessary to conceive of ways to stop the spread of cancer. This paper proposes a mathematical model to investigate the impact of psychological panic, glucose excess, and estrogen excess on the interaction of cancer and immunity. The proposed model is precisely described. The focus of the model’s dynamic analysis is to identify the potential equilibrium locations. According to the analysis, it is possible to establish four equilibrium positions. The stability analys

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref