Preferred Language
Articles
/
fBf97ZIBVTCNdQwCM8Nm
Effects of fear and refuge strategy dependent on predator in food web dynamics
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Effect of food on growth and fecundity Brine Shrimp Artemia spp. laboratory Conditions
...Show More Authors

This in order to test the effect of food on growth and fecundity, two kinds of food have been used the algae Scendesmus quadricaudae and fresh water shrimp powder. For two generations, growth and productivity have been followed up. The fresh water shrimp has been noticed as a food better than algae, because it caused recording, for the two generation higher length rate for the weeks of experiment. The individuals length rate at the end of the forth week reached 9.35 and 9.48 mm for the first generation and second generation respectively. The average length weekly increase rate for the first and second generations individuals feeding on dried shrimp was higher through the first and second week compared to what was recorded when feeding alga

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 05 2021
Journal Name
Research In Intelligent And Computing In Engineering
Implementing Web Testing System Depending on Performance Testing Using Load Testing Method.
...Show More Authors

Web testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t

... Show More
Publication Date
Tue Jan 10 2012
Journal Name
Iraqi Journal Of Science
THE IMPACT OF DISEASE AND HARVESTING ON THE DYNAMICAL BEHAVIOR OF PREY PREDATOR MODEL
...Show More Authors

In this paper, a harvested prey-predator model involving infectious disease in prey is considered. The existence, uniqueness and boundedness of the solution are discussed. The stability analysis of all possible equilibrium points are carried out. The persistence conditions of the system are established. The behavior of the system is simulated and bifurcation diagrams are obtained for different parameters. The results show that the existence of disease and harvesting can give rise to multiple attractors, including chaos, with variations in critical parameters.

View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
The Water Footprint and Virtual Water and Their Effect on Food Security in Iraq
...Show More Authors
Abstract<p>The study aimed to explaining the concepts of water footprint and virtual water and how these two concepts could use to achieve water savings at the local level to meet the water supply deficit in Iraq, which is expected to increase in the coming years and influence of that on food security in Iraq by using these concepts when drawing production, irrigated and import plans in Iraq. The study aimed to studying the water footprint and virtual water and their impact on the foreign trade for wheat and rice crops during the period 2000-2022 and estimating the most important indicators of virtual water and the water footprint of the study crops due to the importance of these criteria in det</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Development of a Job Applicants E-government System Based on Web Mining Classification Methods
...Show More Authors

     Governmental establishments are maintaining historical data for job applicants for future analysis of predication, improvement of benefits, profits, and development of organizations and institutions. In e-government, a decision can be made about job seekers after mining in their information that will lead to a beneficial insight. This paper proposes the development and implementation of an applicant's appropriate job prediction system to suit his or her skills using web content classification algorithms (Logit Boost, j48, PART, Hoeffding Tree, Naive Bayes). Furthermore, the results of the classification algorithms are compared based on data sets called "job classification data" sets. Experimental results indicate

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Tue Sep 26 2023
Journal Name
Brazilian Journal Of Biometrics
Bifurcation analysis of commensalism intraction and harvisting on food chain model
...Show More Authors

In this paper, we study the incorporation of the commensalism interaction and harvesting on the Lotka–Volterra food chain model. The system provides one commensal prey, one harvested prey, and two predators. A set of preliminary results in local bifurcation analysis around each equilibrium point for the proposed model is discussed, such as saddle-node, transcritical and pitchfork. Some numerical analysis to confirm the accruing of local bifurcation is illustrated. To back up the conclusions of the mathematical study, a numerical simulation of the model is carried out with the help of the MATLAB program. It can be concluded that the system's coexistence can be achieved as long as the harvesting rate on the second prey population is

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
The Pleasure of Fear and the Temptation of the Thriller in Horror Cinema: كــاظــم مــؤنـــس عزيز
...Show More Authors

In the theory of cinema genre, horror films are at the forefront of the list. It is one of the oldest genres that saw the light with the early emergence of cinema, taking advantage of literary works, especially Gothic literature and it continues to this day, but the third millennium has seen a marked increase in the number of films and recipients alike. There were many types within the same genre and there are many authors and varied topics, all seeking to spread terror and panic and fear in the hearts of viewers who are passionate about the type of horror. Although the fear and horror have been, throughout the ages, a challenge to the psychological balance and stability, as well as being a rejection and an opposition to the aesthetic ta

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 10 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
QUALITY SYSTEMS.POSSIBILITY OF IMPLEMENTING IN SOME LOCAL FOOD ESTABLISHMENTS: QUALITY SYSTEMS.POSSIBILITY OF IMPLEMENTING IN SOME LOCAL FOOD ESTABLISHMENTS
...Show More Authors

In order to have an idea about what happens in Iraqi food establishments in relation to implement quality management system ISO 9001, this study was performed to show the actual situation of Iraqi food establishments concerning quality management system (ISO 9001:2015), reasons of implementing, factors that hinder implementing and problems faced high administration for getting establishments certification ISO 9001:2015. The study demonstrated from the questionnaire some difficulties to implement ISO 9001 for both of establishments that implemented the quality system or which in implementing of this international standard. The most important problems during implementing were business culture and costs and the most important proble

... Show More
View Publication Preview PDF