Preferred Language
Articles
/
3hfqTo8BVTCNdQwCUWr8
The Dynamics of an Eco-Epidemiological Model with Allee Effect and Harvesting in the Predator
...Show More Authors

The aim of this study was to propose and evaluate an eco-epidemiological model with Allee effect and nonlinear harvesting in predators. It was assumed that there is an SI-type of disease in prey, and only portion of the prey would be attacked by the predator due to the fleeing of the remainder of the prey to a safe area. It was also assumed that the predator consumed the prey according to modified Holling type-II functional response. All possible equilibrium points were determined, and the local and global stabilities were investigated. The possibility of occurrence of local bifurcation was also studied. Numerical simulation was used to further evaluate the global dynamics and the effects of varying parameters on the asymptotic behavior of the system.

Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Global Pharma Technology
synthesis and characterization of heterocyclic compounds and polymers with studying the biological activity for some of them
...Show More Authors

This paper deals with the preparation of new monomers and polymers which including heterocyclic unit. The diacid chlorides compounds [1-3] were prepared from the reaction of glutaric acid, adipic acid, terephthalic acid with thionyl chloride. Succinic acid reacted with ethanol to produce compound [4]. Compound [4] reacted with hydrazine hydrate to obtain succinic hydrazide [5].Compound [5] reaction with CS2 and KOH in absolute ethanol to produce compound [6].The polymers [7-12] have been created by reacting diacid chlorides compounds [1-3] with compound[5] or [6] in dry pyridine with some drops of DMF. The topology of produced compounds has characterized through their spectral and analytical data as in FT-IR spectra, Thermal analysis [DSC,

... Show More
Scopus
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Ordinary Methods (LS,IV) and Robust Methods (2SWLS,LTS,RA) to estimate the Parameters of ARX(1,1,1) Model for Electric Loads
...Show More Authors

 

Abstract:

The models of time series often suffer from the problem of the existence of outliers ​​that accompany the data collection process for many reasons, their existence may have a significant impact on the estimation of the parameters of the studied model. Access to highly efficient estimators  is one of the most important stages of statistical analysis, And it is therefore important to choose the appropriate methods to obtain good  estimators. The aim of this research is to compare the ordinary estimators and the robust estimators of the estimation of the parameters of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Nelson-Olson Method and Two-Stage Limited Dependent Variables (2SLDV ) Method for the Estimation of a Simultaneous Equations System (Tobit Model)
...Show More Authors

This study relates to  the estimation of  a simultaneous equations system for the Tobit model where the dependent variables  ( )  are limited, and this will affect the method to choose the good estimator. So, we will use new estimations methods  different from the classical methods, which if used in such a case, will produce biased and inconsistent estimators which is (Nelson-Olson) method  and  Two- Stage limited dependent variables(2SLDV) method  to get of estimators that hold characteristics the good estimator .

That is , parameters will be estim

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 08 2023
Journal Name
Iraqi Journal Of Laser
PDF Lab-On-a-Chip an integrated microfluidic device sensitive low-Cost, and Rapid with a syringe pump for Analysis of Ibuprofen
...Show More Authors

Abstract: Microfluidic devices present unique advantages for the development of efficient drug assay and screening. The microfluidic platforms might offer a more rapid and cost-effective alternative. Fluids are confined in devices that have a significant dimension on the micrometer scale. Due to this extreme confinement, the volumes used for drug assays are tiny (milliliters to femtoliters).

 In this research, a microfluidic chip consists of micro-channels carved on substrate materials built by using Acrylic (Polymethyl Methacrylate, PMMA) chip was designed using a Carbon Dioxide (CO2) laser machine. The CO2 parameters have influence on the width, depth, roughness of the chip. In order to have regular

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Al-khwarizmi Engineering Journal
The The Application of Virtual Reality to (Mechatronics Engineering) by Creating an Articulated Robotic Work Cell Using EON Reality V9.22.24.24477
...Show More Authors

Virtual reality, VR, offers many benefits to technical education, including the delivery of information through multiple active channels, the addressing of different learning styles, and experiential-based learning. This paper presents work performed by the authors to apply VR to engineering education, in three broad project areas: virtual robotic learning, virtual mechatronics laboratory, and a virtual manufacturing platform. The first area provides guided exploration of domains otherwise inaccessible, such as the robotic cell components, robotic kinematics and work envelope.  The second promotes mechatronics learning and guidance for new mechatronics engineers when dealing with robots in a safe and interactive manner. And the thir

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Technical requirements for the application of economic intelligence and its impact On the dimensions of strategic success of banks: An applied research on a sample of Iraqi banks private
...Show More Authors

This research sheds light on one of the important and vital topics for the banking sectors (technical requirements for the application of economic intelligence) namely by (Hardware, equipment, communication networks, software, databases). And the dimensions of the strategic success of the banks represented by(Customer satisfaction, customer trust, quality of service, growth) In the three Iraqi private banks, namely(Assyria International Investment, Mansour Investment, International Development Investment and Finance). Its implementation is an urgent necessity in order to improve the quality of its banking services to win the satisfaction of its customers and their confidence and then grow to achieve stra

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Rights and duties in the reform project of Imam Ali (peace be upon him) in the footsteps of the Koran and the Sunnah
...Show More Authors

The principle of rights and duties is part of the reform project of the Commander of the Faithful Ali ibn Abi Talib, to build a state of institutions whose foundations have been built on Quranic rules, a prophetic biography, and his diligence in doing so in accordance with the requirements of interests and evil, and his certainty in determining the most important and important, and research analytical study of speeches Imam Ali and his career, in this study (the principle of rights and duties) of the ruler and the parish because of their role in the reform process, which depends on the demolition and construction together, as it is the responsibility of the ruler to demolish all constructed corrupt and contrary to the principles of Islam

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Journal Of Planner And Development
The Infrastructure and the Potential of the Tourism Industry in the Holy City of Najaf.
...Show More Authors

The infrastructure is one of the basic components of the tourism industry in Iraq in general and in Najaf in particular, in spite of there are obstacles and problems that which are hindered the development of tourism in Iraq, some of them are related to the  tourism industry itself, some are related to the security and political situation, and some are related to poor management of tourism. However, the infrastructure is considered the cornerstone of the success of the tourism industry in Iraq and other countries, if it is available, it can be a potential indicator of success, and on the contrary, it is a hindrance to go forward. The aim of this research is to shed light on the availability of requirements for the s

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref