Preferred Language
Articles
/
hhcK7pIBVTCNdQwCWsNp
THE DYNAMICS OF A STAGE-STRUCTURE PREY-PREDATOR MODEL WITH HUNTING COOPERATION AND ANTI-PREDATOR BEHAVIOR
...Show More Authors

The mathematical construction of an ecological model with a prey-predator relationship was done. It presumed that the prey consisted of a stage structure of juveniles and adults. While the adult prey species had the power to fight off the predator, the predator, and juvenile prey worked together to hunt them. Additionally, the effect of the harvest was considered on the prey. All the solution’s properties were discussed. All potential equilibrium points' local stability was tested. The prerequisites for persistence were established. Global stability was investigated using Lyapunov methods. It was found that the system underwent a saddle-node bifurcation near the coexistence equilibrium point while exhibiting a transcritical bifurcation near the vanishing and predator-free equilibrium points. The analytical results are then validated using a numerical approach. It is discovered that the cooperative hunting rate and conversion rate persistently affect the system. In contrast, the anti-predator rate leads to the extinction of the predator.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Dec 20 2024
Journal Name
Iraqi Journal Of Pharmaceutical Sciences
Genetic Polymorphisms at TNF-Alpha Receptors Associated some Autoimmune Diseases and Response of Anti-TNF Biologics: Review
...Show More Authors

Some genetic factors are not only involved in some autoimmune diseases but also interfere with their treatment, Such as Crohn's disease (CD), Rheumatoid Arthritis (RA), ankylosing spondylitis (AS), and psoriasis (PS). Tumor Necrosis Factor (TNF) is a most important pro-inflammatory cytokine, which has been recognized as a main factor that participates in the pathogenesis and development of autoimmune disorders. Therefore, TNF could be a prospective target for treating these disorders, and many anti-TNF were developed to treat these disorders. Although the high efficacy of many anti-TNF biologic medications, the Patients' clinical responses to the autoimmune treatment showed significant heterogeneity. Two types of TNF receptor (TNFR); 1 an

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Umbilical cord drainage versus intraumbilical cord oxytocin injection in management of third stage of labour
...Show More Authors

Background: Postpartum hemorrhage is an important cause of maternal morbidity and mortality. Considerable difference of opinion exist regarding the optimal approach to the management of the 3rd stage of labour, practice varies between countries &between units.Objectives: To evaluate the effectiveness of intra umbilical vein injection of oxytocin and umbilical cord driange in shortening the duration of third stage of labour.Patient and Methods: In this randomized controlled study, 100 women were enrolled in this study they divided into three groups. (Group 1 ,N =30 )received 20 units of oxytocin diluted in 20 ml 0.9% saline solution injected in the umbilical vein after clamping.(Group 2, N = 34) placental cord drainage.(Group 3,

... Show More
Preview PDF
Crossref
Publication Date
Sun Oct 23 2022
Journal Name
Baghdad Science Journal
Comparison Between Deterministic and Stochastic Model for Interaction (COVID-19) With Host Cells in Humans
...Show More Authors

In this paper, the deterministic and the stochastic models are proposed to study the interaction of the Coronavirus (COVID-19) with host cells inside the human body. In the deterministic model, the value of the basic reproduction number   determines the persistence or extinction of the COVID-19. If   , one infected cell will transmit the virus to less than one cell, as a result,  the person carrying the Coronavirus will get rid of the disease .If   the infected cell  will be able to infect  all  cells that contain ACE receptors. The stochastic model proves that if  are sufficiently large then maybe  give  us ultimate disease extinction although ,  and this  facts also proved by computer simulation.

View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Particle-Hole State Density Calculations with Non-Equidistant Spacing Model: II. Pairing and Exact Treatment
...Show More Authors

In an earlier paper, the basic analytical formula for particle-hole nuclear state densities was derived for non-Equidistant Spacing Model (non-ESM) approach. In this paper, an extension of the former equation was made to include pairing. Also a suggestion was made to derive the exact formula for the particle-hole state densities that depends exactly on Fermi energy and nuclear binding energies. The results indicated that the effects of pairing reduce the state density values, with similar dependence in the ESM system but with less strength. The results of the suggested exact formula indicated some modification from earlier non-ESM approximate treatment, on the cost of more calculation time

View Publication Preview PDF
Publication Date
Tue Jul 21 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Numerical Study of the Heat Transfer Behavior in Helical Microcoil Tube
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref