By taking into account various food components in the ecosystem, the research intends to develop a set of difference equations to simulate a plant-herbivore interaction of Holling Type II. We determine the local stability of the equilibrium points for the scenarios of extinction, semi-extinction (extinction for one species), and coexistence using the Linearized Stability Theorem. For a suitable Lyapunov function, we investigate theoretical findings to determine the global stability of the coexisting equilibrium point. It is clear that the system exhibits both Flip and Neimark-Sacker bifurcation under particular circumstances using the central manifold theorem and the bifurcation theory. Numerical simulations are done by MATLAB which are used to validate our conclusions.
Association rules mining (ARM) is a fundamental and widely used data mining technique to achieve useful information about data. The traditional ARM algorithms are degrading computation efficiency by mining too many association rules which are not appropriate for a given user. Recent research in (ARM) is investigating the use of metaheuristic algorithms which are looking for only a subset of high-quality rules. In this paper, a modified discrete cuckoo search algorithm for association rules mining DCS-ARM is proposed for this purpose. The effectiveness of our algorithm is tested against a set of well-known transactional databases. Results indicate that the proposed algorithm outperforms the existing metaheuristic methods.
In the current research work, a system of hiding a text in a digital grayscale image has been presented. The algorithm system that had been used was adopted two transforms Integer Wavelet transform and Discrete Cosine transformed. Huffman's code has been used to encoding the text before the embedding it in the cover image in the HL sub band. Peak Signal to Noise Ratio (PSNR) was used to measure the effect of embedding text in the watermarked image; also correlation coefficient has been used to measure the ratio of the recovered text after applying an attack on the watermarked image and we get a good result. The implementation of our proposed Algorithm is realized using MATLAB version 2010a.
A description of the implementation of integrated practical work in a remote laboratory was presented in this paper. The student, in real time, can access an online web page in order to manipulate a practical work of digital electronics. This work is based on the use of an embedded system PcDuino. The hardware architecture and software solutions are described, as well as the supervision tool that allows the student to follow changes in the output states of the Practical Work remotely.
The thermal maturity , burial history and petroleum generation history of four oil wells selected from four oil fields in Southern Iraq, they are: Nasiriyah(Ns-1 well) , Gharraf (GA-5well) ,Abu Ammood (Ab-1well) and Riffai (Ri-1well) have been studied using 1D basin and petroleum systems modeling. Results showed different period of subsidence, which ranges from high to moderate subsidence, occurred at upper Jurassic to Mid-Cretaceous and slow subsidence in Miocene . The porosity in the studied area represents the highest value in Dammam , Tayarat ,Um-Eradhuma and Khasib Formations. For most of the studied wells, the Paleocene to Miocene has to be regarded as times when the maximum temperature prevailed assoc
... Show MoreIntelligent systems can be used to build systems that simulate human behavior. One such system is lip reading. Hence, lip reading is considered one of the hardest problems in image analysis, and thus machine learning is used to solve this problem, which achieves remarkable results, especially when using a deep neural network, in which it dives deeply into the texture of any input. Microlearning is the new trend in E-learning. It is based on small pieces of information to make the learning process easier and more productive. In this paper, a proposed system for multi-layer lip reading is presented. The proposed system is based on micro content (letters) to achieve the lip reading process using deep learning and auto-correction mo
... Show MoreRecommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem and data sparsity. Numerous recommendation models have been created in order to address these difficulties. Nevertheless, including user or item-specific information has the potential to enhance the performance of recommendations. The ConvFM model is a novel convolutional neural network architecture that combines the capabilities of deep learning for feature extraction with the effectiveness o
... Show MoreLet be a ring with identity and be a submodule of a left - module . A submodule of is called - small in denoted by , in case for any submodule of , implies . Submodule of is called semi -T- small in , denoted by , provided for submodule of , implies that . We studied this concept which is a generalization of the small submodules and obtained some related results
The aim of this book is to present a method for solving high order ordinary differential equations with two point boundary condition of the different kind, we propose semi-analytic technique using two-point osculatory interpolation to construct polynomial solution. The original problem is concerned using two-points osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, we discussion the existence and uniqueness of solutions and many examples are presented to demonstrate the applicability, accuracy and efficiency of the methods by compared with conventional method .i.e. VIDM , Septic B-Spline , , NIM , HPM, Haar wavelets on one hand and to confirm the order convergence on the other
... Show MoreFuchs introduced purely extending modules as a generalization of extending modules. Ahmed and Abbas gave another generalization for extending modules named semi-extending modules. In this paper, two generalizations of the extending modules are combined to give another generalization. This generalization is said to be almost semi-extending. In fact, the purely extending modules lies between the extending and almost semi-extending modules. We also show that an almost semi-extending module is a proper generalization of purely extending. In addition, various examples and important properties of this class of modules are given and considered. Another characterization of almost semi-extending modules is established. Moreover, the re
... Show MoreLet be a commutative ring with identity and be an -module. In this work, we present the concept of semi--maximal sumodule as a generalization of -maximal submodule.
We present that a submodule of an -module is a semi--maximal (sortly --max) submodule if is a semisimple -module (where is a submodule of ). We investegate some properties of these kinds of modules.