Preferred Language
Articles
/
3BaosokBVTCNdQwCyIti
The Impact of Fear on a Harvested Prey–Predator System with Disease in a Prey
...Show More Authors

A mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of the system is investigated with the use of the Lyapunov method. An application to the Sotomoyar theorem of local bifurcation is performed around the equilibrium points. In the end, the system is numerically simulated to confirm our obtained analytical results and specify the control set of parameters. Bifurcation diagrams are used to show the dynamical behavior as a function of some parameters. It is obtained that the prey’s fear stabilizes the system, while the disease and harvest cause extinction in one or more species.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Saudi Endodontic Journal
Comparison of root canal transportation and centering after instrumentation through conservative and traditional access cavities using different file systems
...Show More Authors
Introduction:

While conservative access preparations could increase fracture resistance of endodontically treated teeth, it may influence the shape of the prepared root canal. The aim of this study was to compare the prepared canal transportation and centering ability after continuous rotation or reciprocation instrumentation in teeth accessed through traditional or conservative endodontic cavities by using cone-beam computed tomography (CBCT).

Materials and Methods:

Forty extracted intact, matured, and 2-rooted human maxillary first premolars were selected for this

... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Tue Jul 01 2025
Journal Name
Iraqi Journal Of Scientific And Industrial Research
Surface Morphology and Elemental Analysis of Al2O3 Thin Films Prepared by DC Reactive Sputtering Technique Using Different Gas Mixtures
...Show More Authors

In this study, Al2O3 thin films were prepared by dc reactive sputtering technique using different gas mixtures of argon and oxygen gases (90:10, 70:30, 50:50, 30:70, and 10:90). These films were characterized to introduce their surface morphology and elemental composition as functions of the oxygen content in the gas mixture. The gas mixing ratio plays a crucial role in controlling the nanoscale morphology of the prepared thin films. The [Al]/[O] ratio varies non-linearly with the Ar:O2​ mixing ratio. Increasing the oxygen content leads to a progressive decrease in surface roughness, resulting in smoother and more uniform films with finer granular features. These results presented herein are useful to optimize the sputtering process to ac

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Non-Destructive Damage Assessment of Five Layers Fiber Glass / Polyester Composite Materials Laminated Plate by Using Lamb Waves Simulation
...Show More Authors

Composite materials are widely used in the engineered assets as aerospace structures, marine and air navigation owing to their high strength/weight ratios. Detection and identification of damage in the composite structures are considered as an important part of monitoring and repairing of structural systems during the service to avoid instantaneous failure. Effective cost and reliability are essential during the process of detecting. The Lamb wave method is an effective and sensitive technique to tiny damage and can be applied for structural health monitoring using low energy sensors; it can provide good information about the condition of the structure during its operation by analyzing the propagation of the wave in the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 21 2025
Journal Name
Applied Biochemistry And Biotechnology
Synthesis and characterization of new (Au, Ru, and Rh) ion complexes and evaluating their activity as anticancer and antioxidants
...Show More Authors

View Publication
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jul 29 2025
Journal Name
Plasmonics
Innovative Jet Plasma-Assisted Green Synthesis of TiO2@Ag Core–Shell Nanoparticles Using Chard Leaf Extract for Antibacterial Applications
...Show More Authors

This study presents, for the first time, an innovative Jet Plasma-assisted technique for the green synthesis of TiO₂@Ag core–shell nanoparticles using chard leaf extract as a natural reducing and stabilizing agent. The Jet Plasma provides a highly energetic environment that accelerates nucleation and core–shell formation at low temperatures without toxic precursors. The synthesized nanoparticles exhibited uniform and stable structures, as confirmed by comprehensive characterization techniques including X-ray diffraction (XRD), Fourier-transform infrared spectroscopy (FTIR), ultraviolet–visible (UV–Vis) spectroscopy, transmission electron microscopy (TEM), and zeta potential analysis. XRD patterns confirmed the crystalline anatase

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 13 2023
Journal Name
Drug And Chemical Toxicology
Single and repeat-dose toxicity and local tolerance assessment of newly developed oil emulsion adjuvant formulations for veterinary purposes
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 10 2017
Journal Name
Superconductor Science And Technology
Conceptual designs of conduction cooled MgB<sub>2</sub> magnets for 1.5 and 3.0 T full body MRI systems
...Show More Authors

View Publication
Scopus (66)
Crossref (64)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Preparation and characterization of biomass-alumina composite as adsorbent for safranine-o dye from aqueous solution at different temperatures
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu Feb 06 2020
Journal Name
Scientific Reports
Waste foundry sand/MgFe-layered double hydroxides composite material for efficient removal of Congo red dye from aqueous solution
...Show More Authors
Abstract<p>We aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure</p> ... Show More
Scopus (189)
Crossref (126)
Scopus Clarivate Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (20)
Crossref (11)
Scopus Crossref