Preferred Language
Articles
/
OBYqtokBVTCNdQwCk4yt
Chaos in Beddington–DeAngelis food chain model with fear
Abstract<p>In the current paper, the effect of fear in three species Beddington–DeAngelis food chain model is investigated. A three species food chain model incorporating Beddington-DeAngelis functional response is proposed, where the growth rate in the first and second level decreases due to existence of predator in the upper level. The existence, uniqueness and boundedness of the solution of the model are studied. All the possible equilibrium points are determined. The local as well as global stability of the system are investigated. The persistence conditions of the system are established. The local bifurcation analysis of the system is carried out. Finally, numerical simulations are used to investigate the existence of chaos and understand the effect of varying the system parameters. It is observed that the existence of fear up to a critical value has a stabilizing effect on the system; otherwise it works as an extinction factor in the system.</p>
Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 03 2022
Journal Name
International Journal Of Health Sciences
Corrosion risk assessment of the oil flow line in Southern Iraq

The risk assessment for three pipelines belonging to the Basra Oil Company (X1, X2, X3), to develop an appropriate risk mitigation plan for each pipeline to address all high risks. Corrosion risks were assessed using a 5 * 5 matrix. Now, the risk assessment for X1 showed that the POF for internal corrosion is 5, which means that its risk is high due to salinity and the presence of CO, H2S and POF for external corrosion is 1 less than the corrosion, while for Flowline X2 the probability of internal corrosion is 4 and external is 4 because there is no Cathodic protection applied due to CO2, H2S and Flowline X3 have 8 leaks due to internal corrosion so the hazard rating was very high 5 and could be due to salinity, CO2, fluid flow rate

... Show More
Crossref
Preview PDF
Publication Date
Fri Jan 01 2010
Journal Name
Positioning
Crossref (5)
Crossref
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
E3s Web Of Conferences
Mitigation of Reflection Cracking in Asphalt Concrete Overlay on Rigid Pavements

Reflective cracking is one of the primary forms of deterioration in pavements. It is widespread when Asphalt concrete (AC) overlays are built over a rigid pavement with discontinuities on its surface. Thus, this research work aims to reduce reflection cracks in asphalt concrete overlay on the rigid pavement. Asphalt Concrete (AC) slab specimens were prepared in three thicknesses (4, 5, and 6 cm). All these specimens were by testing machine designed and manufactured at the Engineering Consulting Office of the University of Baghdad to examine for the number of cycles and loads needed to propagate the reflection cracking in the asphalt concert mixture at three temperatures (20, 30, and 30°C). It was noticed that the higher thickness A

... Show More
Scopus Crossref
View Publication
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
Crossref
View Publication
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
A Review of Assured Data Deletion Security Techniques in Cloud Storage

      Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Randomness of Stream Cipher Digital Sequences in the Field GF(28)

     A binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field  to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Jan 30 2020
Journal Name
Al-kindy College Medical Journal
Role of Loop Ileostomy in the Management of Ulcerative Colitis Patients

Background: Ulcerative colitis is a chronic inflammatory condition characterized by relapsing and remitting episodes of inflammation limited to the mucosal layer of the colon.Loop ileostomy might be helpful in the management of the disease.

Objective: To evaluate the role of loop ileostomy in the management of ulcerative colitis.

 Methods: Between Januarys 2008 and January 2018, patients with fulminant ulcerative colitis resistant to medical therapy had been referred to our surgical unit and were included in our study. Assessment of the patients’ medical status (serum electrolytes, total serum protein, complete blood count, erythrocyte sedimentation rate, general stool exam,and abdominal ultrasound

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Wed Jun 24 2020
Journal Name
Journal Of Engineering
Using Steel Slag for Stabilizing Clayey Soil in Sulaimani City-Iraq

The clayey soils have the capability to swell and shrink with the variation in moisture content. Soil stabilization is a well-known technique, which is implemented to improve the geotechnical properties of soils. The massive quantities of waste materials are resulting from modern industry methods create disposal hazards in addition to environmental problems. The steel industry has a waste that can be used with low strength and weak engineering properties soils. This study is carried out to evaluate the effect of steel slag (SS) as a by-product of the geotechnical properties of clayey soil. A series of laboratory tests were conducted on natural and stabilized soils. SS was added by 0, 2.5, 5, 10, 15, and 20% to the soil.

... Show More
Crossref (5)
Crossref
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Advances In Animal And Veterinary Sciences
Scopus Crossref
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref