Preferred Language
Articles
/
ijs-12044
On The Dynamics of Discrete-Time Prey-Predator System with Ratio-Dependent Functional Response
...Show More Authors

In this paper, a discrete- time ratio-dependent prey- predator model is proposed and analyzed. All possible fixed points have been obtained. The local stability conditions for these fixed points have been established. The global stability of the proposed system is investigated numerically. Bifurcation diagrams as a function of growth rate of the prey species are drawn. It is observed that the proposed system has rich dynamics including chaos.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Gazi University Journal Of Science
Reliable Iterative Methods for Solving Convective Straight and Radial Fins with Temperature-Dependent Thermal Conductivity Problems
...Show More Authors

In our article, three iterative methods are performed to solve the nonlinear differential equations that represent the straight and radial fins affected by thermal conductivity. The iterative methods are the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM) to get the approximate solutions. For comparison purposes, the numerical solutions were further achieved by using the fourth Runge-Kutta (RK4) method, Euler method and previous analytical methods that available in the literature. Moreover, the convergence of the proposed methods was discussed and proved. In addition, the maximum error remainder values are also evaluated which indicates that the propo

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 03 2013
Journal Name
Journal Of Earth Sciences And Geotechnical Engineering
Time Domain of Piles Force and Deflection History of Piled Raft System under Axial Repeated Impact Load
...Show More Authors

In order to understand the effect of the number of piles (N), the history response of dynamic pile load in piled raft system and deflection time history of piled raft under repeated impact load applied on the center of piled raft resting on loose sand, laboratory model tests were conducted on small-scale models. The results of experimental work are found to be dynamic load increase with increase height of drop, the measured repeated dynamic load time history on the center of piled raft was close approximately to three a half sine wave shape with small duration in about (0.015 Sec). The maximum peak of impact loads occurs in pile and deflection time history occur after at the time of the peak repeated impact loads, dynamic pile load

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
The Role of Hormones and Toxoplasma gondii Infection to Change the Secondary Sex Ratio
...Show More Authors

     The secondary sex ratio (SSR) is affected by many factors, including the concentration of hormones and infection with some pathogens such as Toxoplasma gondii. This study aimed to evaluate the effect of hormone variability concentrations and toxoplasmosis infection on the secondary sex ratio. 150 pregnant women were selected, 60 infected with late toxoplasmosis (LT), 60 infected with early toxoplasmosis (ET) and 30 seronegative to toxoplasmosis. After tracking the birth outcomes of these women, we calculated SSR in each group. During the second and third trimesters of pregnancy, estrogen, testosterone, progesterone, TSH, T4 and T3 concentrations were measured. The results of the three groups were compared. The results s

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Apr 19 2019
Journal Name
Iraqi Journal Of Science
Effect of Photodeposition Time on the Concentration of Silver Nanoparticles on Core of Optical Fiber End
...Show More Authors

In this work an experimental study of deposited silver nanoparticles on the core of optical fiber end at different time based on photodeposition technique is presented. The results demonstrated that the concentration of silver nanoparticles deposited on the core of optical fiber end was effected by the deposition time. The photodeposition system was fabricated using multi-mode optical fiber and laser diode source. The results show that the silver deposition concentration increases linearly with the deposition time. The deposition rate was 3.25 (wt/ s)

View Publication Preview PDF
Publication Date
Fri Feb 12 2016
Journal Name
International Journal Of Applied Mathematical Research
The dynamics of nutrient, toxic phytoplankton, nontoxic phytoplankton and zooplankton model
...Show More Authors

<p>The objective of this paper is to study the dynamical behavior of an aquatic food web system. A mathematical model that includes nutrients, phytoplankton and zooplankton is proposed and analyzed. It is assumed that, the phytoplankton divided into two compartments namely toxic phytoplankton which produces a toxic substance as a defensive strategy against predation by zooplankton, and a nontoxic phytoplankton. All the feeding processes in this food web are formulating according to the Lotka-Volterra functional response. This model is represented mathematically by the set of nonlinear differential equations. The existence, uniqueness and boundedness of the solution of this model are investigated. The local and global stability

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri May 17 2024
Journal Name
Annals Of Applied Sport Science
Psychological Well-being and Its Relationship with the Functional Creativity of Female Professors of Gymnastics in the Colleges of Physical Education and Sports Sciences in Iraq
...Show More Authors

Background. Teaching quality in gymnastics is influenced by teachers' performance and attitudes, leading to increased functional creativity and psychological well-being. This, in turn, contributes to the success of the sports institution by enhancing the overall performance and overall well-being of the students. Objectives. The research aims to assess the psychological well-being and functional creativity of female gymnastics professors in Iraqi colleges of physical education and sports sciences, focusing on their level of well-being and the relationship between these factors. Methods. The researchers used a descriptive survey method to survey female gymnastics professors at 16 colleges in Iraq's physical education and sports science

... Show More
Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Sample Size on the Item Differential Functioning in the Context of Item Response Theory
...Show More Authors

The current study examined the effect of different sample sizes to detect the Item differential functioning (DIF). The study has used three different sizes of the samples (300, 500, 1000), as well as to test a component of twenty polytomous items, where each item has five categories. They were used Graded Response Model as a single polytomous item response theory model to estimate items and individuals’ parameters. The study has used the Mantel-Haenszel (MH) way to detect (DIF) through each case for the different samples. The results of the study showed the inverse relationship between the sample size and the number of items, which showed a differential performer.

View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
Spam Filtering based on Naïve Bayesian with Information Gain and Ant Colony System
...Show More Authors

This research introduces a proposed hybrid Spam Filtering System (SFS) which consists of Ant Colony System (ACS), information gain (IG) and Naïve Bayesian (NB). The aim of the proposed hybrid spam filtering is to classify the e-mails with high accuracy. The hybrid spam filtering consists of three consequence stages. In the first stage, the information gain (IG) for each attributes (i.e. weight for each feature) is computed. Then, the Ant Colony System algorithm selects the best features that the most intrinsic correlated attributes in classification. Finally, the third stage is dedicated to classify the e-mail using Naïve Bayesian (NB) algorithm. The experiment is conducted on spambase dataset. The result shows that the accuracy of NB

... Show More
View Publication Preview PDF