In this paper, a discretization of a three-dimensional fractional-order prey-predator model has been investigated with Holling type III functional response. All its fixed points are determined; also, their local stability is investigated. We extend the discretized system to an optimal control problem to get the optimal harvesting amount. For this, the discrete-time Pontryagin’s maximum principle is used. Finally, numerical simulation results are given to confirm the theoretical outputs as well as to solve the optimality problem.
Synthesis of 2-(4-Acetyl-phenyl)-4-nitro-isoindole-1, 3-dione chalcones were performed by fusion of 3-nitro phthalic anhydride with p-aminoacetophenone. Then the later was grinded with different aromatic aldehydes in the presence of sodium hydroxide to produce new chalcones derivatives A3-10 without using any solvent formation of new N- arylphthailimide chalcones were confirmed by FT-IR,1HNMR, 13CNMR spectroscopy and all final compounds were tested for their antifungal and antibacterial activity some of them showed more biological activity than the standard drugs
Present study was conducted in order to assess Slabiaat water quality by measuring some physical and chemical factors of river water, the study included a choice of three stations along of Slabiaat River in Samawa city, water samples collected a monthly during the period from September 2013 August 2014. The study involved measuring the Air & water temperatures, pH, Electrical conductivity, Total dissolved solids, Dissolved oxygen, Total hardness, calcium hardness, magnesium, turbidity, and some types of bacteria in River water. The study results showed that the values of air & water temperatures have ranged between (20.1-36.6)?C , (10-21.8) in Slabiaat River, respectively . pH values ranged between (6.6-8.7). Electrical conductivity in
... Show MoreA theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namly (1-Amino-4,7-dimethyl-6-nitro-1H-quinolin-2-one (ADNQ2O)). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G (2d, 2p) level was used to calculate the optimized geometry, physical properties and chemical inhibition parameters, with the local reactivity to predict both the reactive centers and to locate the possible sites of nucleophilic and electrophilic attacks, in vacuum, and in two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in the saline solution (of 3.5%) NaCl were studied using potentiomet
... Show MoreIs the subject of the financial structure of the most important topics for which she received the interests of scientific research in the field of financial management , as it emerged several theories about choosing a financial structure appropriate for the facility and behavior change funding them , and in spite of that there is no agreement on a specific theory answer various questions in this regard , and a special issue of the financial structure optimization.
The objective of the research was to identify the most important theories of the structure of modern financial theory has been to focus on the capture of financial firms in two different stages of their life cycle , so-called growth and ma
... Show MoreA mathematical model is developed which predicates the performance of cylindrical ion exchange bed involving comparing of axial dispersion model for cation exchange column with different assumption, this model permits the performance to predicate the residence time within the bed with the variance, axial dispersion and Pecklet No. to indicated deviation from plug flow model.
Two type of systems are chosen for positive ions first with divalent ions (Ca+2) to exchange with resin of Na+1form used as application in water softener units and second with monovalent ions (Na+1) to exchange with resin of H+1 form used as application in deionize water units &n
... Show MoreThis paper presents a novel idea as it investigates the rescue effect of the prey with fluctuation effect for the first time to propose a modified predator-prey model that forms a non-autonomous model. However, the approximation method is utilized to convert the non-autonomous model to an autonomous one by simplifying the mathematical analysis and following the dynamical behaviors. Some theoretical properties of the proposed autonomous model like the boundedness, stability, and Kolmogorov conditions are studied. This paper's analytical results demonstrate that the dynamic behaviors are globally stable and that the rescue effect improves the likelihood of coexistence compared to when there is no rescue impact. Furthermore, numerical simul
... Show MoreThe aim of this article is to study the dynamical behavior of an eco-epidemiological model. A prey-predator model comprising infectious disease in prey species and stage structure in predator species is suggested and studied. Presumed that the prey species growing logistically in the absence of predator and the ferocity process happened by Lotka-Volterra functional response. The existence, uniqueness, and boundedness of the solution of the model are investigated. The stability constraints of all equilibrium points are determined. The constraints of persistence of the model are established. The local bifurcation near every equilibrium point is analyzed. The global dynamics of the model are investigated numerically and confronted with the obt
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show More