The food web is a crucial conceptual tool for understanding the dynamics of energy transfer in an ecosystem, as well as the feeding relationships among species within a community. It also reveals species interactions and community structure. As a result, an ecological food web system with two predators competing for prey while experiencing fear was developed and studied. The properties of the solution of the system were determined, and all potential equilibrium points were identified. The dynamic behavior in their immediate surroundings was examined both locally and globally. The system’s persistence demands were calculated, and all conceivable forms of local bifurcations were investigated. With the aid of MATLAB, a numerical simulation was used to clarify the control set of parameters and comprehend the overall dynamics. For the system to continue, it was determined that extremely high levels of either fear or harvesting lead to the extinction of one of the predator species. Moreover, in contrast to the ecological assumption that if two species are vying for the same resources, population values cannot be constant, this study showed that it is possible for two competing species to subsist on the same resources.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures
... Show MoreAn experimental model is used to simulate the loss of soil lateral confinement due to excavation nearby an individual axially loaded pile. The effects of various parameters, such as the horizontal distance of excavation, depth of excavation and pile slenderness ratios are investigated. The experimental analysis results showed the effect of excavation is more remarkable as the horizontal distance of excavation becomes closer to the pile than half pile length. The effect of excavation diminishes gradually as the horizontal distance increases beyond that distance for all the investigated pile slenderness ratios and depths of excavation. The pile head deflection, settlement and bending moments along pile increase with decreasing horizontal d
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThis study was conducted to evaluate the efficacy of Saccharomyces cerevesiae as a growth promoting agent in tomato. Soaking the seeds in yeast suspension at 5 g/L for 12h increased germination percentage, root length, root fresh and dry weight, plant height, foliage fresh and dry weight, attained 88.5% ; 8.1 cm ; 84.3 mg ; 7.03 mg ; 10.75 cm ; 839 mg and 37.75 mg compared with 80% ; 5.33 cm ; 39 mg ; 4.8 mg ; 7.35 cm ; 608 mg and 25.5 mg in seedlings grown from non treated seeds respectively. Similar results were obtained with seedling from seeds soaked in S. cerevesiae filtrate for 12 hrs. with values of 77.5% ; 6.875 cm ; 91.5 mg ; 7.5 mg ; 9.5 cm ; 777 mg and 40.35 mg compared to 66% ; 5.8 cm ; 57.7 mg ; 5.03 mg ; 5.9 cm ; 493 mg
... Show MorePurpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreDue to the importance of the extraction process in many engineering and medical industries, in addition to great interest in medicinal plants, in this research, microwave-assisted extraction has been applied to extract some active compounds from Rosmarinus officinalis leaves. The optimal extraction conditions were then determined by calculating the ratio and extraction efficiency. The process has also been described through kinetic study by applying five kinetic models, the Hyperbolic diffusion model, Power low model, the First order reaction model, Elovich's model, and Fick's second law diffusion model and determining their compatibility with the studies operation, and determining the kinetic constants for each model. The result
... Show MoreIn the current analysis, the effects of circumferential scratches along the inner surface of a 170ᵒ -arc partial journal bearing has been numerically investigated. Their impact on the thermo-elasto-hydrodynamic performance characteristics, including maximum pressure, temperature, deformation, and stress, has been examined thoroughly. The ANSYS Fluent CFD commercial code was employed to tackle the iterative solution of flow and heat transfer patterns in the fluid film domain. They are then applied to the ANSYS Static Structure solver to compute the deformation and stress resulted in the solid bearing zone. A wide range of operating conditions has been considered, including the eccentricity ratio ( ) and scratch depth (
... Show More