Preferred Language
Articles
/
BhcWeo0BVTCNdQwCYRVi
Modeling and Analysis of the Influence of Fear on the Harvested Modified Leslie–Gower Model Involving Nonlinear Prey Refuge
...Show More Authors

Understanding the effects of fear, quadratic fixed effort harvesting, and predator-dependent refuge are essential topics in ecology. Accordingly, a modified Leslie–Gower prey–predator model incorporating these biological factors is mathematically modeled using the Beddington–DeAngelis type of functional response to describe the predation processes. The model’s qualitative features are investigated, including local equilibria stability, permanence, and global stability. Bifurcation analysis is carried out on the temporal model to identify local bifurcations such as transcritical, saddle-node, and Hopf bifurcation. A comprehensive numerical inquiry is carried out using MATLAB to verify the obtained theoretical findings and understand the effects of varying the system’s parameters on their dynamical behavior. It is observed that the existence of these factors makes the system’s dynamic behavior richer, so that it involves bi-stable behavior.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Sep 14 2015
Journal Name
Day 2 Tue, September 15, 2015
Modeling and History Matching of a Fractured Reservoir in an Iraqi Oil Field
...Show More Authors
Abstract<p>In recent years the interest in fractured reservoirs has grown. The awareness has increased analysis of the role played by fractures in petroleum reservoir production and recovery. Since most Iraqi reservoirs are fractured carbonate rocks. Much effort was devoted to well modeling of fractured reservoirs and the impacts on production. However, turning that modeling into field development decisions goes through reservoir simulation. Therefore accurate modeling is required for more viable economic decision. Iraqi mature field being used as our case study. The key point for developing the mature field is approving the reservoir model that going to be used for future predictions. This can </p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Engineering
Application of Building Information Modeling (3D and 4D) in Construction Sector in Iraq
...Show More Authors

ABSTRACT

Building Information Modeling (BIM) is becoming a great known established collaboration process in Architecture, Engineering, and Construction (AEC) industry. In various cases in many countries, potential benefits and competitive advantages have been reported. However, despite the potentials and benefits of BIM technologies, it is not applied in the construction sector in Iraq just like many other countries of the world.

The purpose of this research is to understand the uses and benefits of BIM for construction projects in Iraq. This purpose has been done by establishing a fr

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
A Viscoplastic Modeling for Permanent Deformation Prediction of Rubberized and Conventional Mix Asphalt
...Show More Authors

View Publication
Crossref
Publication Date
Sat Mar 16 2019
Journal Name
Route Educational & Social Science Journal
Information awareness of students from Ibn Al-Haytham Education College of pure sciesnces and its influence on their analytical thinking skill
...Show More Authors

this research is to identify the level of information awareness of the chemistry students in their fourth year studying at Ibn Al-Haytham Education College of pure sciences at the University of Baghdad. The research sample consisted of (107) male and female students out of the total number of (153) students studying during the (2017-2018) academic year, The sample therefore represents 71% of the total students. The research methodology used consisted of two parts. The first part is concerned with measuring information awareness using a multiple choice type of test related to (40) issues. The students were required to select the between (5) alternative answers for each issue. The objectives of the test and the issues used are to measure the

... Show More
Publication Date
Fri Mar 20 2020
Journal Name
Plant Archives (09725210) 20 (2)‏
Influence of some factor on somatic embryos induction and germination of date palm CV barhi by using cell suspension culture technique.‏
...Show More Authors

Publication Date
Sun Jan 01 2023
Journal Name
Plant Archives
INFLUENCE OF SOME FACTOR ON SOMATIC EMBRYOS INDUCTION AND GERMINATION OF DATE PALM CV BARHI BY USING CELL SUSPENSION CULTURE TECHNIQUEe
...Show More Authors

INFLUENCE OF SOME FACTOR ON SOMATIC EMBRYOS INDUCTION AND GERMINATION OF DATE PALM CV BARHI BY USING CELL SUSPENSION CULTURE TECHNIQUEe

Publication Date
Fri Mar 27 2020
Journal Name
Plant Archives 20 (supplement 1), 1666-1670‏
INFLUENCE OF SOME FACTOR ON SOMATIC EMBRYOS INDUCTION AND GERMINATION OF DATE PALM CV BARHI BY USING CELL SUSPENSION CULTURE TECHNIQUEث‏
...Show More Authors

Publication Date
Thu Oct 01 2020
Journal Name
August
INFLUENCE OF SOME FACTOR ON SOMATIC EMBRYOS INDUCTION AND GERMINATION OF DATE PALM BARHI C.V BY USING CELL SUSPENSION CULTURE TECHNIQUE
...Show More Authors

INFLUENCE OF SOME FACTOR ON SOMATIC EMBRYOS INDUCTION AND GERMINATION OF DATE PALM BARHI C.V BY USING CELL SUSPENSION CULTURE TECHNIQUE

Publication Date
Mon Apr 06 2020
Journal Name
August
INFLUENCE OF SOME FACTOR ON SOMATIC EMBRYOS INDUCTION AND GERMINATION OF DATE PALM CV BARHI BY USING CELL SUSPENSION CULTURE TECHNIQUE
...Show More Authors

View Publication
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref