In this work, we have developed a model that describes the relationships between top predators (such as tigers, hyenas, and others), crop raiders (such as baboons, warthogs, and deer), and prey (such as deer) in the coffee forests of southwest Ethiopia. Various potential equilibrium points are identified. Additionally, the model's stability in the vicinity of these equilibrium points is examined. An investigation of the model's Hopf bifurcation is conducted concerning several significant parameters. It is found that prey species may be extinct due to a lower growth rate and consumption by top predators in the absence of human interference in the carrying capacity of prey. It is observed that top predators may be extinct due to human interference in their carrying capacity and their smaller dependence on humans in terms of prey and crop raiders, respectively. It is also found that there is an increase in intra-species competition among the top predators, which may intensify the stability of the model. Again, it is also observed that the increase in the intrinsic growth rate of prey and top predators may improve the stability of the model. Lastly, some numerical simulation results have been shown to help visualize the model's dynamics. … Read more
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreAbstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreIn this study , Iraqi Bentonite clay was used as a filler for polyvinyl chloride polymer. Bentonite clay was prepared as a powder for some certain particle size ,followed by calcinations process at (300,700,900) OC ,then milled and sieved. The selected sizes were D ~75 µm and D ~150. After that polyvinyl Al-Cohool solution prepared and used as a coated layer covered the Bentonite powder before applied as a filler ,followed by drying , milling and sieving for limited recommend sizes. polyvinyl chloride solutions were prepared and adding of modified Bentonite power at certain quantities were followed .Sheet of these variables on the mechanical and thermal properties of the prepared reinforced particular polyvinyl chloride composite
... Show MoreAl-Dalmaj marsh and the near surrounding area is a very promising area for energy resources, tourism, agricultural and industrial activities. Over the past century, the Al-Dalmaje marsh and near surroundings area endrous from a number of changes. The current study highlights the spatial and temporal changes detection in land cover for Al-Dalmaj marsh and near surroundings area using different analyses methods the supervised maximum likelihood classification method, the Normalized Difference Vegetation Index (NDVI), Geographic Information Systems(GIS), and Remote Sensing (RS). Techniques spectral indices were used in this study to determine the change of wetlands and drylands area and of other land classes, th
... Show MoreIn this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal
... Show More