In this paper, the dynamical behavior of a three-dimensional fractional-order prey-predator model is investigated with Holling type III functional response and constant rate harvesting. It is assumed that the middle predator species consumes only the prey species, and the top predator species consumes only the middle predator species. We also prove the boundedness, the non-negativity, the uniqueness, and the existence of the solutions of the proposed model. Then, all possible equilibria are determined, and the dynamical behaviors of the proposed model around the equilibrium points are investigated. Finally, numerical simulations results are presented to confirm the theoretical results and to give a better understanding of the dynamics of our proposed model.
Increasing material prices coupled with the emission of hazardous gases through the production and construction of Hot Mix Asphalt (HMA) has driven a strong movement toward the adoption of sustainable construction technology. Warm Mix Asphalt (WMA) is considered relatively a new technology, which enables the production and compaction of asphalt concrete mixtures at temperatures 15-40 °C lower than that of traditional hot mix asphalt. The Resilient modulus (Mr) which can be defined as the ratio of axial pulsating stress to the corresponding recoverable strain, is used to evaluate the relative quality of materials as well as to generate input for pavement design or pavement evaluation and analysis. Based on the aforementioned preface, it is
... Show MoreA mathematical model is developed which predicates the performance of cylindrical ion exchange bed involving comparing of axial dispersion model for cation exchange column with different assumption, this model permits the performance to predicate the residence time within the bed with the variance, axial dispersion and Pecklet No. to indicated deviation from plug flow model.
Two type of systems are chosen for positive ions first with divalent ions (Ca+2) to exchange with resin of Na+1form used as application in water softener units and second with monovalent ions (Na+1) to exchange with resin of H+1 form used as application in deionize water units &n
... Show MoreThe estimation of the regular regression model requires several assumptions to be satisfied such as "linearity". One problem occurs by partitioning the regression curve into two (or more) parts and then joining them by threshold point(s). This situation is regarded as a linearity violation of regression. Therefore, the multiphase regression model is received increasing attention as an alternative approach which describes the changing of the behavior of the phenomenon through threshold point estimation. Maximum likelihood estimator "MLE" has been used in both model and threshold point estimations. However, MLE is not resistant against violations such as outliers' existence or in case of the heavy-tailed error distribution. The main goal of t
... Show MoreIn the current paper, the effect of fear in three species Beddington–DeAngelis food chain model is investigated. A three species food chain model incorporating Beddington-DeAngelis functional response is proposed, where the growth rate in the first and second level decreases due to existence of predator in the upper level. The existence, uniqueness and boundedness of the solution of the model are studied. All the possible equilibrium points are determined. The local as well as global stability of the system are investigated. The persistence conditions of the system are established. The local bifurcation analysis of the system is carried out. Finally, numerical simulations are used t
Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreRecently, the development and application of the hydrological models based on Geographical Information System (GIS) has increased around the world. One of the most important applications of GIS is mapping the Curve Number (CN) of a catchment. In this research, three softwares, such as an ArcView GIS 9.3 with ArcInfo, Arc Hydro Tool and Geospatial Hydrologic Modeling Extension (Hec-GeoHMS) model for ArcView GIS 9.3, were used to calculate CN of (19210 ha) Salt Creek watershed (SC) which is located in Osage County, Oklahoma, USA. Multi layers were combined and examined using the Environmental Systems Research Institute (ESRI) ArcMap 2009. These layers are soil layer (Soil Survey Geographic SSURGO), 30 m x 30 m resolution of Digital Elevati
... Show MoreThe theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show More