In the present paper, an eco-epidemiological model consisting of diseased prey consumed by a predator with fear cost, and hunting cooperation property is formulated and studied. It is assumed that the predator doesn’t distinguish between the healthy prey and sick prey and hence it consumed both. The solution’s properties such as existence, uniqueness, positivity, and bounded are discussed. The existence and stability conditions of all possible equilibrium points are studied. The persistence requirements of the proposed system are established. The bifurcation analysis near the non-hyperbolic equilibrium points is investigated. Numerically, some simulations are carried out to validate the main findings and obtain the critical values of the bifurcation parameters, if any. It is obtained that the existence of fear controls the disease outbreak and the system's persistence. While in the case of a rising hunting cooperation rate, the induced fear may control the outbreak of disease.
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreIn this paper, a discrete SIS epidemic model with immigrant and treatment effects is proposed. Stability analysis of the endemic equilibria and disease-free is presented. Numerical simulations are conformed the theoretical results, and it is illustrated how the immigrants, as well as treatment effects, change current model behavior
Scams remain among top cybercrime incidents happening around the world. Individuals with high susceptibility to persuasion are considered as risk-takers and prone to be scam victims. Unfortunately, limited number of research is done to investigate the relationship between appeal techniques and individuals' personality thus hindering a proper and effective campaigns that could help to raise awareness against scam. In this study, the impact of fear and rational appeal were examined as well as to identify suitable approach for individuals with high susceptibility to persuasion. To evaluate the approach, pretest and posttest surveys with 3 separate controlled laboratory experiments were conducted. This study found that rational appeal treatm
... Show MoreObjective: To assess the fear of laboring women regarding the delivery on themselves and their
newborns.
Methodology : A descriptive study was conducted on (100) pregnant women who where admitted to
labor room in Al- Yarmock Teaching Hospital/Maternity Units, Fatima Al- Zahra and Ibn-Al Baladi
Maternity and Pediatric Hospital. The questionnaire was consisted of pregnant women
socio-demographic data, reproductive data and fear items of labor. Data were collected by using a
questionnaire format, through interview technique and reviewing pregnant records, descriptive and
inferential statistical procedure were used to analyze the data.
Results: The main results of the study revealed a high mean of scores with moderate
Uropathogenic E. coli (UPEC) is problematic and still the leading cause of urinary tract infections worldwide. It is developed resistance against most antibiotics. The investigation, surveillance system, and efficient strategy will facilitate selecting an appropriate treatment that could control the bacterial distribution. The present study aims to investigate the epidemiology and associated risk factors of uropathogenic E. coli and to study their antibiotic resistance patterns. 1585 midstream urine specimens were collected from symptomatic urinary tract infections (UTI) patients (225 males and 1360 females) admitted to Zakho emergency hospital, Zakho, Kurdistan Region, Iraq from January 2016 until the end of December 2
... Show MoreIn this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of societie
... Show More