In this paper, a four species mathematical models involving different types of ecological interactions is proposed and analyzed. Holling type – II functional response is a doubted to describes the behavior of predation. The existence, uniqueness and boundedness of the solution are discussed. The existences and the stability analysis of all possible equilibrium points are studied. suitable Lyapunov functions are used to study the global dynamics of the system. Numerical simulations are also carried out to investigate the influence of certain parameters on the dynamical behavior of the model, to support the analytical results of the model.
The research involved attempt to inhibit the corrosion of Al-Si-Cu alloy in 2.5x10-3 mol.dm-3 NaOH solution (pH=11.4) by addition of six different inhibitors with three concentrations (1x10-3, 1x10-2, and 0.1 mol.dm-3). These inhibitors include three organic materials (sodium acetate, sodium benzoate, and sodium oxalate) and three inorganic materials (sodium chromate, disodium phosphate, and sodium sulphate). The data that concerning polarization behaviour are calculates which include the corrosion potential (Ecorr) and current density (icorr), cathodic and anodic Tafel slopes (bc & ba), and polarization resistance (Rp). Protection efficiency (P%) and activation energy (Ea) values were calculated for inhibition by the six inhibitors. The
... Show MoreBackground: The aim of this study was to comparatively evaluate the push out bond strength (PBS) of root canal fillings using four different obturation techniques (single cone (SC), cold lateral compaction (CLC), continuous wave (CW), and carrier based gutta percha (CBG)). Materials and Methods: Forty mandibular premolar decoronated and instrumented with rotary ProTaper to F3 then teeth were divided randomly into 4 groups of 10 teeth for each as follow: group (I) single- cone obturation with matched-taper gutta-percha, group (II) cold lateral compaction technique, group (III) continuous wave of obturation technique, and group( IV) carrier based gutta-percha technique. Zinc oxide eugenol (ZOE) sealer was used as a root canal sealer for the
... Show MoreThe present study is considered a pioneer investigation that deal with the terrestrial brown garden snail Cornu aspersum (Müller), in Iraq. Cornu aspersum however is considered an exotic species in many parts of the world ,The species is most probably infiltrates with plants transferred from one place to another. The species has gained importance in many ways. Nutritionally, the species is consumed as food item in many countries, but in other cases it is considered as pest for the damage it causes when feeding on valuable plant shoots. It also has medical importance for its role and ability in healing wounds, burns and remedy of other skin problems. This snail species however may act as a vector for some parasitic nematodes that
... Show MoreThe research is an anatomical study for the stem and leaves of Galium aparine
L.The nodal anatomy was carefully investigated ,by the cross sections at the node
provide that what was called "cyclic arrangement" of leaves is in fact includes just
two opposite leaves which take their vascularization from the stele by two leaf
traces.The rest four leaf- like appendages on the node are stipules ,and take their
vascularization from the vascular ring which bond the two opposite leaves,and
refered for some morphological and anatomical characters of the plant species in this
work.
The appearance of Mixed Mode Oscillations (MMOs) and chaotic spiking in a Light Emitting Diode (LED) with optoelectronic feedback theoretically and experimentally have been reported. The transition between periodic and chaotic mixed-mode states has been investigated by varying feedback strength. In incoherent semiconductor chaotically spiking attractors with optoelectronic feedback have been observed to be the result of canard phenomena in three-dimensional phase space (incomplete homoclinic scenarios).
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More