Start your abstract here the objective of this paper is to study the dynamical behaviour of an eco-epidemiological system. A prey-predator model involving infectious disease with refuge for prey population only, the (SI_) infectious disease is transmitted directly, within the prey species from external sources of the environment as well as, through direct contact between susceptible and infected individuals. Linear type of incidence rate is used to describe the transmission of infectious disease. While Holling type II of functional responses are adopted to describe the predation process of the susceptible and infected predator respectively. This model is represented mathematically by the set of nonlinear differential equations. The existence, uniqueness and boundedness of the solution of this model are investigated. The local and global stability conditions of all possible equilibrium points are established. Finally, numerical simulation is used to study the global dynamics of the mode.
The effect of ozone gas with temperatures 35. 40 and 45 Celsius to control on larval and adult stages of Tribolium castaneum was tested and at time of exposure 1.0, 3.0, 7.0, 9.0, 11.0, 13.0 hours and the level of relative humidity prevailing during the test 45 ± 1%. Results showed significant differences between the exposure times, when the percentage of mortality 100% between larvae (primary, intermediate and advanced) in the treatment effect at a temperature of 35 Celsius with ozone gas at exposure time to 9.0, 11.0, 11.0 hours for the three ages respectively, and adult (male and female) in the same treatment when the three heat degrees had given ratios the total mortality reached 100% of both males at exposure time to 7.0 ,3
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThe activity of Adhatoda vasica crude plants extracts against B.thuringiensis bacteria was determined by MIC test and sensitivity test which showed no response of this type of bacteria against extracts .The interference between the effect of hot and cold aqueous extracts and Bacillus thuringiensis bacteria for controlling the population of fig moth when males and females released before treatment under control condithion was gave a highly percentage of larval mortality which reached to 100% in (B.t. + hot aqueous extract ) and 97.3% in (B.t + coldaqueous extract ) after two weeks of treatment when concentration of 50% of aqueous extracts and 5×10?1of Bacillus thuringiensis bacteria but when the insect (males & females) released after
... Show MoreTo assess the effect of Nigella sativa oil as a topical preparation for treatment of oro- genital ulceration of Behcet's disease. This is a double blinded therapeutic trial in which 40 patients with Behcet's disease manifested as recurrent episodes of oral and genital ulceration were enrolled into 2 groups; Nigella sativa oil was applied as 10% in glycerin topically 3 times / daily to the first 20 patients. The other 20 were given glycerin only. Assessment was done 4 days then 8 days after treatment.Results were recorded as they appeared in clinical examination and those records were arranged in tables for both groups concerning oral and genital ulceration cases.Nigella sativa oil is a new topical agent for promotion of healing of o
... Show MoreThe electrical activity of the heart and the electrocardiogram (ECG) signal are fundamentally related. In the study that has been published, the ECG signal has been examined and used for a number of applications. The monitoring of heart rate and the analysis of heart rhythm patterns, the detection and diagnosis of cardiac diseases, the identification of emotional states, and the use of biometric identification methods are a few examples of applications in the field. Several various phases may be involved in the analysis of electrocardiogram (ECG) data, depending on the type of study being done. Preprocessing, feature extraction, feature selection, feature modification, and classification are frequently included in these stages. Ever
... Show MoreThe Nuclear structure of 110-116Cd isotopes was studied theoretically in the framework of the interacting boson model of IBM-l and IBM-2. The properties of the lowest mixed symmetry states such as the 1+, 2+ and 3+ levels produced by the IBM-2 model in the vibrational-limit U(5) of Cd - isotopes are studied in details. This analysis shows that the character of mixed symmetry of 2+ is shared between and states in 110-114Cd – isotopes, the large shar goes to s, while in isotope, the state is declared as a mixed symmetry state without sharing. This identification is confirmed by the percentage of F-spin contribution. The electromagnetic properties of E2 and Ml operators were investigated and the results were analyzed. Various
... Show MoreNaber and toning in the modern Arab poetry Mahmoud Darwish, a model
The research deals with the interchange of the sign transformed from the universal to the local in the theatrical show through the direction processing in the production of a communicative artistic discourse and message, thus making the process of reading the speech and recognizing it by taking into account the cultural differences, customs and local rituals of each country, region, or area. The problem of the research was focused on answering the following question: What are the requirements for the sign in terms of its transformation between the universality and locality in the read-out?
The importance of research is to determine the requiremen
... Show MoreThe present study aimed to identify the availability of the National Council of Teachers of Mathematics (NCTM) standards in the content of mathematics textbooks at the basic education stage in the Sultanate of Oman. The study used the descriptive-analytical approach, adopting the method of content analysis through using a content analysis tool that included (43) indicators distributed on the four NCTM standards related to the field of geometry, after verifying their validity and reliability. The study population consisted of mathematics textbooks (first and second semesters) for ninth-grade students in the Sultanate of Oman in the academic year 2018/2019, while the sample consisted of Geometry units in the content of those books, which a
... Show MoreThe current study aims to develop a proposed educational program based on augmented reality (AR) technology, in addition to assessing its effectiveness in developing research and historical imagination skills of the Humanities Track's female students at the secondary stage, as well as assessing the correlative and predictive relationships between the amount of growth for the two dependent variables. To achieve this, a secondary school in the city of Makkah Al-Mukarramah was chosen, and an available random sample of (30) female students from the study population was selected. The quasi-experimental approach was followed by this study, particularly one group design. In addition, two tools were used to collect study data, namely: a test of
... Show More