In this work, the dynamic behavior of discrete models is analyzed with Beverton- Holt function growth . All equilibria are found . The existence and local stability are investigated of all its equilibria.. The optimal harvest strategy is done for the system by using Pontryagin’s maximum principle to solve the optimality problem. Finally numerical simulations are used to solve the optimality problem and to enhance the results of mathematical analysis
The goal of this paper is to study dynamic behavior of a sporadic model (prey-predator). All fixed points of the model are found. We set the conditions that required to investigate the local stability of all fixed points. The model is extended to an optimal control model. The Pontryagin's maximum principle is used to achieve the optimal solutions. Finally, numerical simulations have been applied to confirm the theoretical results.
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThe present study aims to identify the most and the least common teaching practices among faculty members in Northern Border University according to brain-based learning theory, as well as to identify the effect of sex, qualifications, faculty type, and years of experiences in teaching practices. The study sample consisted of (199) participants divided into 100 males and 99 females. The study results revealed that the most teaching practice among the study sample was ‘I am trying to create an Environment of encouragement and support within the classroom which found to be (4.4623). As for the least teaching practice was ‘I use a natural musical sounds to create student's mood to learn’ found to be (2.2965). The study results also in
... Show MoreBack ground: Gastrointestinal Stromal Tumors (GISTs), although are rare, are the most common mesenchymal tumors of the digestive system. Vascular endothelial growth factor(VEGF) is associated with the malignant potential of several types of carcinomas.
Patients, material, and methods: This is a retrospective study including thirty two randomly selected cases of GISTs collected from the pathology laboratory of the gastroenterology and hepatology teaching hospital and from private laboratories from the period January 2010 to December 2013. VEGF immunohistochemical marker was applied to the tumor tissue sections to evaluate its expression and to correlate it with other parameters.Objectives<
... Show MoreDetection moving car in front view is difficult operation because of the dynamic background due to the movement of moving car and the complex environment that surround the car, to solve that, this paper proposed new method based on linear equation to determine the region of interest by building more effective background model to deal with dynamic background scenes. This method exploited the permitted region between cars according to traffic law to determine the region (road) that in front the moving car which the moving cars move on. The experimental results show that the proposed method can define the region that represents the lane in front of moving car successfully with precision over 94%and detection rate 86
... Show MoreThe effect of nitrogen fertilizer and the planting distance on growth and yield of the sunflower cultivar (Taka) was investigated. The experiment was conducted in the field using five nitrogen fertilizer levels (0, 50, 100, 150, 200) kg/donum and three planting distances (10, 20, 30) cm/plant. The experiment design was split-plot by using RCBD with four replicates. The level of fertilizer as the main plot, while the planting distance as the sub plot. Plant high and yield components were measured. Results indicated that using 200 kg/donum of nitrogen and 30 cm/plant of planting distance gave the highest rate of 1000 seeds weight and the number of seeds/ head. While using 200 kg/donum of nitrogen fertilizer with 10 cm/plant of planting dista
... Show More