A prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of local bifurcation including Hopf bifurcation is investigated. Furthermore, to complete our study, the global dynamics of the model are investigated and the set of control parameters is set by conducting numerical simulations.
Background: One way to target polypharmacy and inappropriate medication in hemodialysis (HD) patients is with medication deprescribing. Objective: To assess the impact of implementing a pharmacist-led deprescribing program on medication adherence among HD patients. Method: A prospective interventional, one-group pretest-posttest-only design study was conducted at a hemodialysis center in Wasit Governorate, Iraq. Medication reconciliation followed by medication review based on the deprescribing program was done for all eligible patients, and the patients were monitored for three months for any possible complications. Results: Two hundred and seventy patients were screened for eligibility. Only one hundred and eighteen were enrolled i
... Show MoreThe research aims to determine the impact of Human Resources Accounting (HRA) on employee’s performance. The research’s problem was embodied in the lack of interest in HRA, which was reflected on the performance of employees in the Ministry of Education; the research adopted the descriptive-analytical approach, and the research community included the directors of departments and people at the headquarters of the Ministry of Education. The sample size was (224) individuals from the total community of 533. The questionnaire was adopted as the main tool for collecting data and information, as well as the interviews that were conducted by the researcher. In order to analyze t
... Show MoreThis study aims to observe and analysis the propaganda discourse image for Daesh, and know how it marketing the fear due to symbols structure, and discover the straight meanings and hidden inspiration, with the ideology that the image presented.
The study is descriptive and qualitative, and the method is analytic survey used semiotic approach.
The most important results of the study refer to:
- Daesh functioning the image in fear manufacture in all it components: the symbol of savageness, body language, color, clothes uniform and professionally shot.
- The indicative meaning of fear promoted by Daesh based of the manufacturing «Holy», and that mean places non-touchable and non-insulted.
- Daesh used in its propagand
A Survey Study Of A Sample Of The Public Of Baghdad Governorate
The current study aimed to identify the most prominent psychological and behavioral repercussions of the exposure of the elderly to the news of the Corona pandemic and to determine the mechanisms of their exposure. On an intended sample on both sides of (Al-Karkh and Al-Rasafa) and the simple random sample was adopted to choose the place of distribution of the questionnaire and the intentional sample.
The research concluded several results, most TV news is still a primary source of information and that most of the sample move between stations to see more information about the pandemic and that the presentation of views confuses the elderly ،There
... Show MoreThe objectives of this study revolve around identifying the extent of funding impact on the future of the printed Iraqi press, and whether it threatens their chances of survival, stating the extent of technological development on the income of the printed newspaper, and identifying the causes of the financial crisis on the newspaper.
This research is classified as descriptive research, and the researcher used the survey method, and adopted the questionnaire of the views of the contactors, in five Iraqi newspapers (morning - extent - time - the way of the people - the call).
The research community included (68) respondents, whereby the comprehensive inventory method was used to define the research community, and the researcher used
The objectives of this study revolve around identifying the extent of funding impact on the future of the printed Iraqi press, and whether it threatens their chances of survival, stating the extent of technological development on the income of the printed newspaper, and identifying the causes of the financial crisis on the newspaper. This research is classified as descriptive research, and the researcher used the survey method, and adopted the questionnaire of the views of the contactors, in five Iraqi newspapers (morning - extent - time - the way of the people - the call). The research community included (68) respondents, whereby the comprehensive inventory method was used to define the research community, and the researcher used t
... Show MoreThis research began by explaining its variables and dimensions especially the digital gap, which the authors explained it elaborately beginning with the concept, the reasons blind its emergence of its measurement, and how to treat it. The authors supposed the potentiality of relying on enforcing knowledge in general and the groups suffer from this gap in particular, especially the targeted knowledge to treat its subject.
As enforcing knowledge usually depends on some strategies or choices of organizational orientation among them is learning and training from one side, and communication, as an indicating factor for organizational effectiveness as the authors refer from the other side.
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More