In this paper, a harvested prey-predator model involving infectious disease in prey is considered. The existence, uniqueness and boundedness of the solution are discussed. The stability analysis of all possible equilibrium points are carried out. The persistence conditions of the system are established. The behavior of the system is simulated and bifurcation diagrams are obtained for different parameters. The results show that the existence of disease and harvesting can give rise to multiple attractors, including chaos, with variations in critical parameters.
This study aims to estimate the accuracy of digital elevation models (DEM) which are created with exploitation of open source Google Earth data and comparing with the widely available DEM datasets, Shuttle Radar Topography Mission (SRTM), version 3, and Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. The GPS technique is used in this study to produce digital elevation raster with a high level of accuracy, as reference raster, compared to the DEM datasets. Baghdad University, Al Jadriya campus, is selected as a study area. Besides, 151 reference points were created within the study area to evaluate the results based on the values of RMS.Furthermore, th
... Show MoreAbstract
The research aims to investigate the existence of correlations and influence between agricultural insurance risk management and economic development in the National Insurance Company with farmers, as agriculture is one of the leading branches of the national economy, ensuring food security and eliminating poverty to ensure sustainable ec
... Show MoreBreast cancer is one of the most important malignant diseases all over the world. The incidence of breast cancer is increasing around the world and it is still the leading cause of cancer mortality An Approximately 1.3 million new cases were diagnosed worldwide last year. With areas rising increasing, risk factors for breast cancer including obesity, early menarche, alcohol and smoking, environmental contamination and reduced or late birth rates become more prevalent. In Iraq, breast cancer ranks first among types of cancers diagnosed in women. This study was conducted on one hundred twenty women with breast cancer that was evaluated and investigated for the possible role of the risk factors on the development of breast cancer in females. T
... Show MoreAn accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground Cardiovascular disease (CVD) is a leading cause of death worldwide. Ischemic heart disease is a major cause of morbidity and mortality. Lack of blood supply to the brain can cause tissue death if any of the cerebral veins, carotid arteries, or vertebral arteries are blocked. An ischemic stroke describes this type of event. One of the byproducts of methionine metabolism, the demethylation of methionine, is homocysteine, an amino acid that contains sulfur. During myocardial ischemia, the plasma level of homocysteine (Hcy) increases and plays a role in many methylation processes. Hyperhomocysteinemia has only recently been recognized as a major contributor to the increased risk of cardiovascular disease (CVD) owing to its eff
... Show MoreZM Al-Bahrani, Medico Legal Update, 2021
In this paper we use the Markov Switching model to investigate the link between the level of Iraqi inflation and its uncertainty; forth period 1980-2010 we measure inflation uncertainty as the variance of unanticipated inflation. The results ensure there are a negative effect of inflation level on inflation uncertainty and all so there are a positive effect of inflation uncertainty on inflation level.  
... Show More