In this paper, an ecological model with stage-structure in prey population, fear, anti-predator and harvesting are suggested. Lotka-Volterra and Holling type II functional responses have been assumed to describe the feeding processes . The local and global stability of steady points of this model are established. Finally, the global dynamics are studied numerically to investigate the influence of the parameters on the solutions of the system, especially the effect of fear and anti-predation.
Electrodeposition of metal oxides on graphite electrodes can improve their ability to remove organic substances. In this work, multicomponent oxides of Mn, Co, and Ni were electrochemically deposited on both the anode and cathode of graphite electrodes to enhance their performance in removing phenol. Formation of the deposit was achieved within 2 h in current densities of 20, 25, 30, and 35 mA/cm2 for better composite properties. The deposited layer was characterized by testing the surface structure, morphology, composition, and roughness. X-ray diffraction (XRD), scanning electron microscopy (SEM), energy dispersive X-ray (EDX), and Atomic force microscopy (AFM) techniques facilitated these tests. The composite electrodes have synthesized
... Show MoreThis paper presents an analytical study for the magnetohydrodynamic (MHD) flow of a generalized Burgers’ fluid in an annular pipe. Closed from solutions for velocity is obtained by using finite Hankel transform and discrete Laplace transform of the sequential fractional derivatives. Finally, the figures are plotted to show the effects of different parameters on the velocity profile.
Gender classification is a critical task in computer vision. This task holds substantial importance in various domains, including surveillance, marketing, and human-computer interaction. In this work, the face gender classification model proposed consists of three main phases: the first phase involves applying the Viola-Jones algorithm to detect facial images, which includes four steps: 1) Haar-like features, 2) Integral Image, 3) Adaboost Learning, and 4) Cascade Classifier. In the second phase, four pre-processing operations are employed, namely cropping, resizing, converting the image from(RGB) Color Space to (LAB) color space, and enhancing the images using (HE, CLAHE). The final phase involves utilizing Transfer lea
... Show MoreAbsorption and lifetime measurements were made for C6H6. and C6D6 molecules in pure solid phase and in solid matrices of Ar, N2, CO, and CO2. All measurement are made at low temperatures ranging between 12-50 K. A modified least square fitting deconvolution was utilized to measure the fluorescence lifetime with an error less than 1%. The results show that the use of matrix isolation technique offer a unique environment that minimize the perturbation of the molecular or atomic system and hence facilitate spectral analysis.
Negotiations are distinguished in that they are an easy and simple means between the conflicting parties, and it is an effective means at the same time as the conflicting parties seek understanding on the most effective way to solve their dispute, but negotiations are not always appropriate to resolve international disputes, especially when there is a disparity in power between the negotiating countries, or when it is missing Goodwill, or even when one of the parties is absent or less flexible, and the internal circumstances of one of the conflicting countries may play a negative or positive role in the success of the negotiations, away from the influence of the role of external variables in that, a
... Show MoreThe aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally
... Show More