The aim of this work is to study a modified version of the four-dimensional Lotka-Volterra model. In this model, all of the four species grow logistically. This model has at most sixteen possible equilibrium points. Five of them always exist without any restriction on the parameters of the model, while the existence of the other points is subject to the fulfillment of some necessary and sufficient conditions. Eight of the points of equilibrium are unstable and the rest are locally asymptotically stable under certain conditions, In addition, a basin of attraction found for each point that can be asymptotically locally stable. Conditions are provided to ensure that all solutions are bounded. Finally, numerical simulations are given to verify and support the obtained theoretical results.
The result showed that hot water and ethanol extracts of Nigella sativa contain alkaloids ,saponins, flavonoids,tannins,glycosides,terpins and steroids. Albino mice were administered orally with 0.1 of the extract at dose of 100 mg/kg, body weight the results showed high level of white blood cell ,total and differential count of WBC,phagocytosis index, mitotic index, Arthus and delayed type hypersensitivity. The result, also showed high level of hemoglobin (Hb) and the packed cell volume (PCV) the alcoholic extract has been found more efficient than hot water extract on mice.
This paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show MoreThe world is currently facing a medical crisis. The epidemic has affected millions of people around the world since its appearance. This situation needs an urgent solution. Most countries have used different solutions to stop the spread of the epidemic. The World Health Organization has imposed some rules that people should adhere. The rules are such, wearing masks, quarantining infected people and social distancing. Social distancing is one of the most important solutions that have given good results to confront the emerging virus. Several systems have been developed that use artificial intelligence and deep learning to track social distancing. In this study, a system based on deep learning has been proposed. The system includes monitor
... Show MoreAt a time when the general rules in the different legal systems require the presence of two parties to the contract, one of which is issued the first expression of the will and is called the offer, and the other is issued from the other and is called the acceptance. A special type of contracts emerged in the beginning of the last century called the “unilateral contracts”. The side sparked a major jurisprudential dispute, as well as the issuance of several contradictory judicial rulings on it. Hence, this research came to highlight this special type of contract. Key words: the definition of a unilateral contract, its distinction from other legal situations, and its effects.
In this paper, experimental study has been done for temperature distribution in space conditioned with Ventilation Hollow Core Slab (TermoDeck) system. The experiments were carried out on a model room with dimensions of (1m 1.2m 1m) that was built according to a suitable scale factor of (1/4). The temperature distributions was measured by 59 thermocouples fixed in several locations in the test room. Two cases were considered in this work, the first one during unoccupied period at night time (without external load) and the other at day period with external load of 800W/m2 according to solar heat gain calculations during summer season in Iraq. All results confirm the use of TermoDeck system for ventilation and cooling/heat
... Show MoreAbstract:
In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the
... Show MoreA field experiment was conducted in Al-Yusufiya district - Al-Mahmoudiya district, Baghdad province during the winter season 2021, to study improving the efficiency and management of water use and the productivity of lettuce under different irrigation systems. The Nested-Factorial Experiments design was used, where the main plots include the first factor, irrigation levels (I1) 50%, (I2) 75%, (I3) 100, (I4) 125%, (I5) 150% ETpan. After depleting 35% of the available water and in terms of climatic data from the American Evaporative Basin, Class A. Then the main factor is divided into three replicates, and the coefficients of the second factor are distributed randomly within each replicate, which includes the irrigation system: surface drip i
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.