The aim of this study was to propose and evaluate an eco-epidemiological model with Allee effect and nonlinear harvesting in predators. It was assumed that there is an SI-type of disease in prey, and only portion of the prey would be attacked by the predator due to the fleeing of the remainder of the prey to a safe area. It was also assumed that the predator consumed the prey according to modified Holling type-II functional response. All possible equilibrium points were determined, and the local and global stabilities were investigated. The possibility of occurrence of local bifurcation was also studied. Numerical simulation was used to further evaluate the global dynamics and the effects of varying parameters on the asymptotic behavior of
... Show MoreThe theme of this Study presents analysis and discuss to the "Share the framework for assessing inflation," a practical study in a sample of joint stock companies listed on the Iraq Stock Exchange for the years (2009-2013). To determine the extent of the disparity between the nominal value of shares (Nominal Value) before deducting inflation and the real value (Real Value) per share, after deducting inflation in the case of zero growth. The study relied on annual reports of the companies of the research sample of the Iraq Stock Exchange, as well as the Iraqi Securities Commission. Besides the annual reports issued by the Ministry of Planning, as well as annual reports and statistical bulletin issued by the Central Bank of Iraq. It is fra
... Show MoreMany consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreThis research after financial ratios in the detection of fraud to the financial statements published which enables specialists from the work of their studies and their conclusions to obtain the information they seek on the activities of the entity. Has provided researchers what these relics They then field study to test the validity and sincerity of the findings of the suggestions that have been upheld the need to study all financial ratios extracted in general, organized and used in decision-making processes necessary administrative.And that the financial management attention more financial analysis and extraction of financial ratios and compare them with industry standards taken from historical norms
Many carbonate reservoirs in the world show a tilted in originally oil-water contact (OOWC) which requires a special consideration in the selection of the capillary pressure curves and an understanding of reservoir fluids distribution while initializing the reservoir simulation models.
An analytical model for predicting the capillary pressure across the interface that separates two immiscible fluids was derived from reservoir pressure transient analysis. The model reflected the entire interaction between the reservoir-aquifer fluids and rock properties measured under downhole reservoir conditions.
This model retained the natural coupling of oil reservoirs with the aquifer zone and treated them as an explicit-region composite system
in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
This paper deals with an analytical study of the flow of an incompressible generalized Burgers’ fluid (GBF) in an annular pipe. We discussed in this problem the flow induced by an impulsive pressure gradient and compare the results with flow due to a constant pressure gradient. Analytic solutions for velocity is earned by using discrete Laplace transform (DLT) of the sequential fractional derivatives (FD) and finite Hankel transform (FHT). The influences of different parameters are analyzed on a velocity distribution characteristics and a comparison between two cases is also presented, and discussed in details. Eventually, the figures are plotted to exhibit these effects.
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
The floating ice shelves around Antarctica, which buttress ice streams from the continent and slow their discharge into the sea, are thinning at faster rates. Paolo