In this paper, a Sokol-Howell prey-predator model involving strong Allee effect is proposed and analyzed. The existence, uniqueness, and boundedness are studied. All the five possible equilibria have been are obtained and their local stability conditions are established. Using Sotomayor's theorem, the conditions of local saddle-node and transcritical and pitchfork bifurcation are derived and drawn. Numerical simulations are performed to clarify the analytical results
In this work we run simulation of gas dynamic problems to study the effects of Riemann
problems on the physical properties for this gas.
We studied a normal shock wave travels at a high speed through a medium (shock tube). This
would cause discontinuous change in the characteristics of the medium, such as rapid rise in
velocity, pressure, and density of the flow.
When a shock wave passes through the medium, the total energy is preserved but the energy
which can be extracted as work decreases and entropy increases.
The shock tube is initially divided into a driver and a driven section by a diaphragm. The
shock wave is created by increasing the pressure in the driver section until the diaphragm bursts,
se
The emergence of oil fields and subsequent changes in adjacent land use are known to affect settlements and communities. Everywhere the industry emerges, there is little understanding about the impact of oil fields on land use in the surrounding areas. The oil industry in Iraq is one of the most important industries and is almost the main industry in the Iraqi economic sector, and it is very clear that this industry is spread over large areas, and at the same time adjoins with population communities linked to it developmentally.
The rapid development and expansion of oil extraction activities in various regions has led to many challenges related to land-use planning and management. Here, the problem of research arises on th
... Show MoreBackground and purpose: Animal model helps researchers to evaluate new treatment plan for human and understand pathological mechanism involved in a development of disease. The use of rats as an animal model for Alzheimer's research has become a favorite among researchers. Rats are capable in mimicking Alzheimer disease due to their intelligence and quick adaptation to nature. At present there are several methods that can be used to induce Alzheimer's animals, but each method has advantages and disadvantages. We need to learn other methods that can provide many advantages and few disadvantages. The Amyloid-beta 42 (Aβ-42) and Reactive Oxygen Species (ROS) are thought to play an important role in the pathology of Alzheimer’s disease. Th
... Show MoreA total of 47 species belonging to 46 genera, 34 subfamilies, 23 families and 7 orders of predator and parasitoid insects were collected and identified. The survey was conducted throughout the program held by the General Directorate of Agriculture-Duhok, in cooperating with the College of Agricultural Engineering Sciences in Duhok Province, Kurdistan Region, Iraq from May 2013 to April 2014.
The species hosts, collecting date, locality and distributions are given. The current checklist also included some species previously collected by other researchers in Duhok Province.
The predator Melanthrips pallidior Priesner regarded as a new record in Baghdad. The specimens were collected from alfalfa field during April 2010 to April 2011 in Abu-Gharib. Morphological characters of different body parts were studied and compared with other specimens by using taxonomic keys.
Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show More