The present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stability of the axial equilibrium point is discussed using the appropriate Lyapunov function, while the basin of attraction of the positive equilibrium point is investigated. The persistence constraints of the system are established. The local and Hopf bifurcation analyses of the system are examined. Lastly, numerical simulations are given to ensure the theoretical results with the help of Matlab program (version R2018b). It is found that the effect of fear plays a substantial role in the dynamic of the system. On the other hand, the refuge’s coefficient continuously affects the system. Furthermore, the variation of the refuge’s coefficient by utilizing different initial points leads to a change in the behavior of the system from stable to unstable and conversely.
Introduction: Since the hallmark of gestational trophoblastic disease is trophoblastic proliferation, Ki67 is regarded as the best marker in studying hydatidiform mole.This study was conducted to evaluate the role of this proliferative marker in distinguishing among hydropic abortion, partial and complete hydatidiform mole. Materials and methods: This is a cross sectional study involving the application of Ki67 on a total of 90 histological samples of curetting materials from molar (partial and complete mole) and non molar hydropic abortion belong to Iraqi females, so three study groups were created. Immunohistochemical expression in villous cytotrophoblasts, syncytiotrophoblasts and stromal cells were recorded separately by three i
... Show MoreThe disruptions in supply chains have put small‐ and medium‐sized enterprises (SMEs) in dire need of resilient supply chains through which they can improve their performance. Based on the resource dependence theory, this study proposes a mediation model to improve the environmental performance (EP) of SMEs. The purpose of this study is to investigate the effect of supply chain resilience (SCR) on EP mediated by ambidextrous green innovation (AMGI). We proved a structural equation model based on questionnaire data from 261 companies in Iraq to test our hypotheses. The results show that SCR has a positive effect on AMGI for proactive and exploitative green innovation dimensions and positive impact on SMEs’ EP. AMGI plays a media
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThe study was conducted to assess the attitude and awareness of a sample of people regarding the indiscriminate slaughter and its effects on health and the environment compared with slaughtering in a slaughterhouse. The sample consisted of 120 persons from six equal professional groups contacted with the butchery labour (livestock keeper, truck driver, butcher, veterinarian, shopkeeper and consumer). The age ranged 22-76 years old, mean 52±10 years, lived ≥ 5 years in the Baghdad city. The results showed that there is a preference for slaughtering inside the slaughterhouse due to the presence of veterinary examination, slaughtering and preparing meat in a healthy, easy-to-clean places, unlike the indiscriminate sla
... Show MoreCoronavirus disease (Covid-19) has threatened human life, so it has become necessary to study this disease from many aspects. This study aims to identify the nature of the effect of interdependence between these countries and the impact of each other on each other by designating these countries as heads for the proposed graph and measuring the distance between them using the ultrametric spanning tree. In this paper, a network of countries in the Middle East is described using the tools of graph theory.
The present study aims to describe the histological structure of kidney of, (Herpestes javanicus ) that inhabits Iraqi lands. Transverse sections of kidney stained with hematoxylin and eosin showed two distinct regions, the outer thin darkly stained cortex and inner thick lightly stained medulla, which further subdivided into external and internal medullary zones linked with one conical renal papilla. The lateral margin of the outer medullary tissue forms a secondary renal pyramid with a specialized fornix. All the nephrons in the kidney start with the renal corpuscle [Malpighian], which is formed from two distinct parts, these are a centrally located glomerulus, which represented by a tuft of blood capillaries and an outer Bowman’s capsu
... Show More