In this paper a stage structure prey-predator model with Hollimg type IV functional response is proposed and analyzed. The local stability analysis of the system is carried out. The occurrence of a simple Hopf bifurcation and local bifurcation are investigated. The global dynamics of the system is investigated with the help of the Lyapunov function. Finally, the analytical obtained results are supported with numerical simulation and the effects of parameters system are discussed. It is observed that, the system has either stable point or periodic dynamics.
Abstract
In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons
... Show MoreIn this paper, we introduced a mathematical model for Iraqi Airways Company about evaluating its objectives and strategies. First, we studied Iraqi Airways schedules with different departure cities for each airline path. Then, we applied some fuzzy integrals for determining the best airline path.
Abstract
This study talks about a wonderful Qur'anic style. relates to one of the methods used in it. And it's the rhetorical style: ''Affirmative say''. It is useful in arguing with the opponent, nullifying his reasoning, and proving the opposite meaning of the opponent. The study will be conducted from a Qur'anic perspective based on the study of examples of it, and partly in interpretive treatment through the book of editing and enlightenment of Taher Ibn Ashour, known for his art in matters of rhetoric and methods of controversy. This is with the rooting of this issue, and the relationship of industrial sciences to it as a Qur'anic style.
Keywords: ''Affirmative say, style, Qur'anic rhetoric, Arabic rhetoric, Co
... Show MoreEvery so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show MorePost-structural critical studies highlighted the importance of studying the texts surrounding the text as an important part in the process of receiving and understanding texts, and although this topic was dealt with by the ancient Arabs and Europeans, interest in it appeared clearly after the appearance of Gerard Genet's book (SEUILS), which separated it Text Thresholds. Or what he called paratexte, and dealt with them with interest as he reads them on books. With the development of semiotic studies, interest in paratexte studies began in a broader way and in various literary and non-literary texts, including journalistic texts. And since specialized magazines are one of the press releases that enjoy their privacy in terms of topics and
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn this paper the proton, neutron and matter density distributions and the corresponding root mean square (rms) radii of the ground states and the elastic magnetic electron scattering form factors and the magnetic dipole moments have been calculated for exotic nucleus of potassium isotopes K (A= 42, 43, 45, 47) based on the shell model using effective W0 interaction. The single-particle wave functions of harmonic-oscillator (HO) potential are used with the oscillator parameters b. According to this interaction, the valence nucleons are asummed to move in the d3f7 model space. The elastic magnetic electron scattering of the exotic nuclei 42K (J?T= 2- 2), 43K(J?T=3/2+ 5/2), 45K (J?T= 3/2+ 7/2) and 47K (J?T= 1/2+ 9/2) investigated t
... Show MoreThe principle of citizenship has international dimensions that affect the application of the principle, such as the structure of the international system, and the control of the concepts of globalization, international organizations which played an important role in the consolidation of this principle.
The problem of the study revolves around the effects of international variables on the principle of citizenship in Kuwait during the period 1991-2018.
The study used several indicators, such as: the rule of law, achieving the principle of separation of powers, the right to form parties, the application of the law of nationality, and racial discrimination, women's rights, and freedom of expression.
The spread of novel coronavirus disease (COVID-19) has resulted in chaos around the globe. The infected cases are still increasing, with many countries still showing a trend of growing daily cases. To forecast the trend of active cases, a mathematical model, namely the SIR model was used, to visualize the spread of COVID-19. For this article, the forecast of the spread of the virus in Malaysia has been made, assuming that all Malaysian will eventually be susceptible. With no vaccine and antiviral drug currently developed, the visualization of how the peak of infection (namely flattening the curve) can be reduced to minimize the effect of COVID-19 disease. For Malaysians, let’s ensure to follow the rules and obey the SOP to lower the