In the current paper, the effect of fear in three species Beddington–DeAngelis food chain model is investigated. A three species food chain model incorporating Beddington-DeAngelis functional response is proposed, where the growth rate in the first and second level decreases due to existence of predator in the upper level. The existence, uniqueness and boundedness of the solution of the model are studied. All the possible equilibrium points are determined. The local as well as global stability of the system are investigated. The persistence conditions of the system are established. The local bifurcation analysis of the system is carried out. Finally, numerical simulations are used to investigate the existence of chaos and understand the effect of varying the system parameters. It is observed that the existence of fear up to a critical value has a stabilizing effect on the system; otherwise it works as an extinction factor in the system.
The new multidentate Schiff-base (E)-6,6′-((1E,1′E)-(ethane-1,2-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-ylidene))bis(4-methyl-2-((E)(pyridine-2-ylmethylimino)methyl)phenol) H2L and its polymeric binuclear metal complexes with Cr(III), Mn(II), Fe(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II) are reported. The reaction of 2,6-diformyl-4-methyl-phenol with ethylenediamine in mole ratios of 2:1 gave the precursor 3,3′-(1E,1′E)-(ethane-1,2-diylbis(azan-1-yl-1ylidene))bis(methan-1-yl-1-ylidene)bis(2-hydroxy-5-methylbenzaldehyde) W. Condensation of the precursor with 2-(amino-methyl)pyridine in mole ratios of 1:2 gave the new N6O2 multidentate Schiff-base ligand H2L. Upon complex formation, the ligand behaves as a dibasic oct
... Show MoreIntroduction: Dental fear is defined as the patient’s specific reaction towards stress related to dental treatment in which the stimulus is unkn..
The subject of fear is one of the most important tasks that one should seek to find out the reasons behind it, and push it up with all its sound mental concepts.
The main reason for the lack of security and fear and disturbance in the world is to commit the legitimate violations that God warned us in his Holy Book as well as in the Sunnah of His Prophet (peace be upon him).
The talk about the causes of fear in the Koran is not limited to the word (fear) Fakk but came in different and varied methods such as (horror) and (awe) and (shares) and (narrow).
In order to have an idea about what happens in Iraqi food establishments in relation to implement quality management system ISO 9001, this study was performed to show the actual situation of Iraqi food establishments concerning quality management system (ISO 9001:2015), reasons of implementing, factors that hinder implementing and problems faced high administration for getting establishments certification ISO 9001:2015. The study demonstrated from the questionnaire some difficulties to implement ISO 9001 for both of establishments that implemented the quality system or which in implementing of this international standard. The most important problems during implementing were business culture and costs and the most important proble
... Show MoreA prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of loc
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreThere are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.
Steganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of
... Show MoreThe use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreThis paper focuses on developing a strategy to represent the -connected ominoes using an abacus. We use the idea of -connected ominoes with respect to a frame in modelling nested chain abacus. Then, we formulate and prove the unique connected partition for any -connected ominoes. Next, the topological structure of nested chain abacus is presented.