The food web is a crucial conceptual tool for understanding the dynamics of energy transfer in an ecosystem, as well as the feeding relationships among species within a community. It also reveals species interactions and community structure. As a result, an ecological food web system with two predators competing for prey while experiencing fear was developed and studied. The properties of the solution of the system were determined, and all potential equilibrium points were identified. The dynamic behavior in their immediate surroundings was examined both locally and globally. The system’s persistence demands were calculated, and all conceivable forms of local bifurcations were investigated. With the aid of MATLAB, a numerical simulation was used to clarify the control set of parameters and comprehend the overall dynamics. For the system to continue, it was determined that extremely high levels of either fear or harvesting lead to the extinction of one of the predator species. Moreover, in contrast to the ecological assumption that if two species are vying for the same resources, population values cannot be constant, this study showed that it is possible for two competing species to subsist on the same resources.
Provisions and controls on the disposal of public funds between Sharia and law
Research Summary
That money is the foundation of life and one of the most important reasons for the reconstruction of the land, and God is the owner
The real value of this money, God has borrowed some individuals on public money, and people
They are charged with preserving it, since it is beneficial to them all, without anyone taking it
To himself, and the guardian is charged by God to protect this money and aggression
Because of its power, authority, various organs and public servants of the province
Upon him; Because the assault on public money by employees and others in the organs of the state
And exploitation of their jobs and this
HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThe harvest of hydrocarbon from the depleted reservoir is crucial during field development. Therefore, drilling operations in the depleted reservoir faced several problems like partial and total lost circulation. Continuing production without an active water drive or water injection to support reservoir pressure will decrease the pore and fracture pressure. Moreover, this depletion will affect the distribution of stress and change the mud weight window. This study focused on vertical stress, maximum and minimum horizontal stress redistributions in the depleted reservoirs due to decreases in pore pressure and, consequently, the effect on the mud weight window. 1D and 4D robust geomechanical models are
The Iraqi economy has suffered for a long period of inflation because of the Iraq war and the resolutions and the sanctions that were imposed on Iraq, this phenomenon overshadowed at various aspects of the economy including the tax revenue that the State seeks to optimize the total income for the budget, the research covers the years 1990-2010, these years have been divided according to the country's economic variables.
The research adopted on econometrics analysis that is based on the information and data available on topics and has been using statistical methods to test functions are formulated.
Research concluded that rates of inflation and GDP impact is limited to direct taxation and indirect in current prices a
... Show More