Start your abstract here the objective of this paper is to study the dynamical behaviour of an eco-epidemiological system. A prey-predator model involving infectious disease with refuge for prey population only, the (SI_) infectious disease is transmitted directly, within the prey species from external sources of the environment as well as, through direct contact between susceptible and infected individuals. Linear type of incidence rate is used to describe the transmission of infectious disease. While Holling type II of functional responses are adopted to describe the predation process of the susceptible and infected predator respectively. This model is represented mathematically by the set of nonlinear differential equations. The existence, uniqueness and boundedness of the solution of this model are investigated. The local and global stability conditions of all possible equilibrium points are established. Finally, numerical simulation is used to study the global dynamics of the mode.
To translate sustainable concepts into sustainable structure, there is a require a collaborative work and technology to be innovated, such as BIM, to connect and organize different levels of industry e.g. decision-makers, contractors, economists, architects, urban planners, construction supplies and a series of urban planning and strategic infrastructure for operate, manage and maintain the facilities. This paper will investigate the BIM benefits as a project management tool, its effectiveness in sustainable decision making, also the benefit for the local industry key stakeholders by encouraging the BIM use as a project management tool to produce a sustainable building project. This p
The estimation of the regular regression model requires several assumptions to be satisfied such as "linearity". One problem occurs by partitioning the regression curve into two (or more) parts and then joining them by threshold point(s). This situation is regarded as a linearity violation of regression. Therefore, the multiphase regression model is received increasing attention as an alternative approach which describes the changing of the behavior of the phenomenon through threshold point estimation. Maximum likelihood estimator "MLE" has been used in both model and threshold point estimations. However, MLE is not resistant against violations such as outliers' existence or in case of the heavy-tailed error distribution. The main goal of t
... Show MoreIn this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).
Simulation of the Linguistic Fuzzy Trust Model (LFTM) over oscillating Wireless Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThe main object of this study is to solve a system of nonlinear ordinary differential equations (ODE) of the first order governing the epidemic model using numerical methods. The application under study is a mathematical epidemic model which is the influenza model at Australia in 1919. Runge-kutta methods of order 4 and of order 45 for solving this initial value problem(IVP) problem have been used. Finally, the results obtained have been discussed tabularly and graphically.
The study of the relationship between the coordinates of the sun and the moon with the crescent visibility factors has not been previously treated in a detailed and accurate way in research and previous studies, despite its religious importance. Accordingly, this paper aims to study the relationship between the crescent visibility factors (age, lag time, elongation (ARCL), arc of vision or relative altitude (ARCV), relative azimuth (DAZ), and crescent width (W), with coordinates of the sun and the moon), and how it varies during the day of the crescent's observation. In this paper, Matlab programs were designed to calculate the ecliptic sun and moon coordinates (λ, β) and in the presence of all perturbation impacts (planets), th
... Show MoreThe subject of indication is one of many subjects that the Arabic language interest in and we decide that this research which we called (Indication of the abstract and Augmented Tri verbs) in one of Al-Quran Suras which is Al-moulk to dive in the secrets and knowledge of its meanings and knowledge of its structure in terms of abstraction and increase, And the investigation of our ancient scholars of linguistics and interpreters in its meanings. The verbss were classified according to the structure in which they were presented. The research includes two sections followed by the conclusion of the research, sources and its references. The first section (the indication of the abstract Tri verbs) in the sura is divided into four branches in w
... Show MoreThis research deals with shedding light on the issue of the poor understanding of students of Islamic sciences colleges for the subject of modern sciences; their causes and treatment, and it started with an introduction and an introductory research; The general weakness of the level of students of colleges of Islamic sciences in this article, and I detailed these reasons that relate to: the curriculum, the teaching staff, and students, and then concluded it with proposals and recommendations that would address this weakness.