A modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify the validity of the theoretical analysis and visualize the model dynamics.
An electrochemical sensor based on manganese dioxide nanorodMnO2and Graphene oxide (GO) functionalized with 4-amino, 3-substituted 1H, 1, 2, 4 Triazole 5(4H) thion (FGO)/MnO2Nanocompositewas developed for voltammetric determination of Tetracycline (TET).The working electrode WE of SPCE was modified bya drop casting method. X-ray powder diffractometer (XRD), scanning electron microscopy (SEM) and FT-IR were employed to characterize the synthesized FGO/MnO2. The determination of TET at the modified electrode was studied by cyclic voltammetry (CV) and differential pulse voltammetry (DPV) in the phosphate buffer solution (PBS).TET show sharp increase in the oxidation peaks in the pH 2.Voltammetric characteristics of TET (Epa, Ipa) were estimate
... Show Morethis research is to identify the level of information awareness of the chemistry students in their fourth year studying at Ibn Al-Haytham Education College of pure sciences at the University of Baghdad. The research sample consisted of (107) male and female students out of the total number of (153) students studying during the (2017-2018) academic year, The sample therefore represents 71% of the total students. The research methodology used consisted of two parts. The first part is concerned with measuring information awareness using a multiple choice type of test related to (40) issues. The students were required to select the between (5) alternative answers for each issue. The objectives of the test and the issues used are to measure the
... Show MoreINFLUENCE OF SOME FACTOR ON SOMATIC EMBRYOS INDUCTION AND GERMINATION OF DATE PALM CV BARHI BY USING CELL SUSPENSION CULTURE TECHNIQUEe
INFLUENCE OF SOME FACTOR ON SOMATIC EMBRYOS INDUCTION AND GERMINATION OF DATE PALM BARHI C.V BY USING CELL SUSPENSION CULTURE TECHNIQUE
The research problem is that most of the construction projects exceed the planned value, due to the failure to implement the plans on time. The current study aims to monitor the implementation of the project and for each of the executed tasks of the table of quantities in order to detect deviations at the time they occur, evaluate the time and cost performance, and then identify the areas of waste and analyze the implementation of each task in order to diagnose the underlying problems and find possible and applicable solutions in the environment Iraqi. The research was applied in one of the companies specialized in the field of construction projects, and one of the most important conclusions reached is the possibility of applying
... Show MoreThe current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More