The present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stability of the axial equilibrium point is discussed using the appropriate Lyapunov function, while the basin of attraction of the positive equilibrium point is investigated. The persistence constraints of the system are established. The local and Hopf bifurcation analyses of the system are examined. Lastly, numerical simulations are given to ensure the theoretical results with the help of Matlab program (version R2018b). It is found that the effect of fear plays a substantial role in the dynamic of the system. On the other hand, the refuge’s coefficient continuously affects the system. Furthermore, the variation of the refuge’s coefficient by utilizing different initial points leads to a change in the behavior of the system from stable to unstable and conversely.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreThe aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.
In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Rotating fan shaft system was investigated experimentally and theoretically to study its dynamic performance. The type of oil used for the bearing was taken in consideration during the experimental program .Three types of oil were used, SAE 40, SAE 50 and degraded oil. During the experiments, the fan blades stagger angle was changed through angles (20˚, 30˚, 40˚, and 50˚). The shaft rotational speed also changed in the range of (0-3000 rpm). All these parameters have investigated for two cases (balanced and unbalanced fan). The performance parameters of the fan were found experimentally by measuring the fan, volume flow rate, Reynolds and Strouhal numbers, efficiency and pressure head. Analytical part was also represented to prepare
... Show MoreAbstract:
This research seeks to test the influence of intellectual capital as an explanatory variable and its components (human capital, structural capital, relational capital) and sustainable competitive performance as a responsive variable and its components (reducing service delivery cycle time, rapid response to market demand, increasing customer satisfaction, providing better Quality of service, increasing market share)” through a field study, and here the research problem was diagnosed in an attempt to answer the following question: Is there awareness among the senior management within the private colle
... Show MoreABSTRACTBackground: In Iraq smoking is a common habit in both the urban and rural areas. There are many respiratory diseases like chronic bronchitis, bronchial carcinoma and emphysema which are related to chronic tobacco smoking.Objectives: To study the effect of tobacco smoking on the respiratory system, to establish a correlation between chronic tobacco smoking and its effects on the parameters which were studied and to create awareness in tobacco smokers about the effects of tobacco on their healthMethod: In this study 100 male subjects, 50 chronic smokers and 50 non- smokers were assessed for their pulmonary function tests by using a computerized spirometer.Results: Almost all their respiratory parameters were significantly reduced.
... Show More