In this paper, we investigate the impact of fear on a food chain mathematical model with prey refuge and harvesting. The prey species reproduces by to the law of logistic growth. The model is adapted from version of the Holling type-II prey-first predator and Lotka-Volterra for first predator-second predator model. The conditions, have been examined that assurance the existence of equilibrium points. Uniqueness and boundedness of the solution of the system have been achieve. The local and global dynamical behaviors are discussed and analyzed. In the end, numerical simulations are confirmed the theoretical results that obtained and to display the effectiveness of varying each parameter on our proposed model.
Emotions are part of the personality of the individual and affect many different aspects of the personality, and it is an important element of social and psychological adaptation, especially if it is within the limits of nature, and if the methods used to express them are appropriate and moderate.
Submission is one of the characteristics that express the way an individual relies upon in dealing with others and in dealing with matters of life. An individual who complies with instructions and orders and abides by them, and performs what is required of him without hesitation or delay. Adolescence is an important and accurate stage in the constructive development of an individual and in his psychological and social life.
The
... Show MoreMuseum education is of great importance to an appropriate representation of museums’ collections and exhibits, including traditional fashion. Therefore, museum educators/curators need to be equipped with the most essential skills in their profession in order to adequately present the museum’s history and holdings. This could be achieved through specialized training programs. However, Arab countries are still behind in terms of museum education. Therefore, this article aims to shed light on this issue by assessing the knowledge and skills possessed by museum educators/curators and how training programs could affect them
This study attempts to address the importance of communicative digitization in the field of various arts for the sake of continuity of shopping and aesthetic, artistic and intellectual appreciation of artistic achievements by the recipient on various places of their residence in light of the COVID 19 crisis, and to highlight the importance of the plastic arts of the Iraqi painter exclusively and how it expresses in a contemporary way the environment or life reality in Iraq in light of this crisis. With all its implications affecting the life reality from various aspects and methods of its negative and positive employment. As for the research procedures, the researcher reviewed the research methodology represented by the descriptive ana
... Show MoreBackground: Polymethyl methacrylate (PMMA) is the most commonly used material in denture fabrication. The material is far from ideal in fulfilling the mechanical requirements, like low impact and transverse strength, poor thermal conductivity. The purpose of this study was to evaluate the effect of addition a composite of surface treated Nano Aluminum oxide (Al2O3) filler and plasma treated polypropylene fiber (PP) on some properties of denture base material. Materials and methods: One hundred fifty prepared specimens were divided into 5 groups according to the tests, each group consisted of 30 specimens and these were subdivided into 3 groups (unreinforced heat cured acrylic resin as control group),reinforced acrylic resin with( 0.5%wt Nan
... Show MoreThe current research aims to determine the impact of the cognitive reconstruction program on the development of psychological hardness among middle school students through the experimental verification of three hypotheses. The research sample consisted of (16) out of (450) students selected from Ibn Rushud preparatory school- Al-Rusafa 2. These participants have been randomly distributed into two equal groups. The researcher has used the method of cognitive reconstruction with the experimental group, whereas with the controlling group, he used nothing. The researcher has further used the scale of psychological hardness of Kobassa with the participants; the scale has been built in a way that suits the sample of the study, which consisted
... Show MoreEpithelial and stromal communications are essential for normal uterine functions and their dysregulation contributes to the pathogenesis of many diseases including infertility, endometriosis, and cancer. Although many studies have highlighted the advantages of culturing cells in 3D compared to the conventional 2D culture system, one of the major limitations of these systems is the lack of incorporation of cells from non‐epithelial lineages. In an effort to develop a culture system incorporating both stromal and epithelial cells, 3D endometrial cancer spheroids are developed by co‐culturing endometrial stromal cells with cancerous epithelial cells. The spheroids developed by this method are phenot
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More