The avoidance strategy of prey to predation and the predation strategy for predators are important topics in evolutionary biology. Both prey and predators adjust their behaviors in order to obtain the maximal benefits and to raise their biomass for each. Therefore, this paper is aimed at studying the impact of prey’s fear and group defense against predation on the dynamics of the food-web model. Consequently, in this paper, a mathematical model that describes a tritrophic Leslie-Gower food-web system is formulated. Sokol-Howell type of function response is adapted to describe the predation process due to the prey’s group defensive capability. The effects of fear due to the predation process are considered in the first two levels. It is assumed that the generalist predator grows logistically using the Leslie-Gower type of growth function. All the solution properties of the model are studied. Local dynamics behaviors are investigated. The basin of attraction for each equilibrium is determined using the Lyapunov function. The conditions of persistence of the model are specified. The study of local bifurcation in the model is done. Numerical simulations are implemented to show the obtained results. It is watched that the system is wealthy in its dynamics including chaos. The fear factor works as a stabilizing factor in the system up to a specific level; otherwise, it leads to the extinction of the predator. However, increasing the prey’s group defense leads to extinction in predator species.
The CdSe pure films and doping with Cu (0.5, 1.5, 2.5, 4.0wt%) of thickness 0.9μm have been prepared by thermal evaporation technique on glass substrate. Annealing for all the prepared films have been achieved at 523K in vacuum to get good properties of the films. The effect of Cu concentration on some of the electrical properties such as D.C conductivity and Hall effect has been studied.
It has been found that the increase in Cu concentration caused increase in d.c conductivity for pure CdSe 3.75×10-4(Ω.cm)-1 at room temperatures to maximum value of 0.769(Ω.cm)-1 for 4wt%Cu.All films have shown two activation energies, where these value decreases with increasing doping ratio. The maximum value of activation energy was (0.319)eV f
n-Hexane conversion enhancement was studied by adding TCE (Trichloro-ethylene) on feed stream using 0.3%Pt/HY zeolite catalyst. All experiments were achieved at atmospheric pressure and on a continuous laboratory unit with a fixed bed reactor at a temperature range 240-270◦C, LHSV 1-3h-1, H2/nC6 mole ratio 1-4.
By adding 435 ppm of TCE, 49.5 mole% conversion was achieved at LHSV 1h-1, temperature of 270ºC and H2/nC6 mole ratio of 4, while the conversion was 18.3 mol% on the same catalyst without adding TCE at the same conditions. The activation energy decreased from 98.18 for pure Pt/HY zeolite to 82.83 kJ/mole by adding TCE. Beside enhancement the activity, selectivity and product distribution enhanced by providing DMB (Dimethyl b
The study was planned to evaluate the effect of adding Guanidinoacetic acid in some characteristics of the sperm of the rams. This study was conducted in the animal field of the Animal Production Department / Faculty of Agricultural Engineering Sciences / University of Baghdad, for the period from 5/8/2018 to 28/2/2019. In this experiment, 3 rams were used at the age of 2-2.5 years and weighed 50-54 kg. The semen was collected early in the morning and once a week and the semen was pooled to remove the individual differences. The treatments were divided: GAA-free control group, treatment T1 (0.05 mg / 100 ml GAA), T2 treatment (0.1 mg / 100 ml GAA) and T3 treatment (0.2 mg / 100 ml GAA). The results of the study showed a significant decrease
... Show MoreThe phenomenon of negative behavior has studied as a social and psychological phenomenon that effect on the performance and life of workers inside and outside the organization. The adoption of this phenomenon is studied in terms of the role of the internal environment of the organization in addressing this behavior, being the variables belong to the field of organizational behavior to see the results of those variables on the Iraqi organizations, since the specificities of it differ from the rest of the Arab and foreign environments. Therefore, this study focused on testing the relationship of the internal environment of the organization and its role in addressing the negative behavior of the workers.
thi
... Show MoreDue to the large size of dealing in the transactions installment sales in durable products, especially real estate given the privacy to enjoy their property, among other products because of the large amount and the length of the repayment period leading to a risk of non-payment by the buyer because of the possibility to change the credit level to him, especially that most of this type of transaction customers are from limited income owners, So it has been proposed the use of other transactions in handling real estate instead of installment sales transactions, a rental sale transactions because of the protection provided by this transaction for a vendor that will be mentioned later.
So proposes to st
... Show MoreThis study aims to prepare educational sessions for the strategy (team-pair-solo) in practical volleyball lessons for female students and identifying its effect on learning the accuracy of the spiking skill in volleyball. An experimental design with experimental and control groups was employed on a purposive sample of (30) female students who were to constitute (42.254%) from their community represented by the sophomores at the College of Physical Education and Sports Sciences for Girls / University of Baghdad who are in good standing in the morning study for the academic year (2022-2023), whose total number is (71) students. According to the determinants of the experimental design, participants were divided into two equal groups, a
... Show MoreThe aim of the research is to prepare practical volleyball lessons by using the four pillars strategy for middle school students, and to identify the effect of the four pillars strategy in performing the transmission and volleyball skills in the second intermediate students, to assume that the two researchers assume that there are no statistically significant differences between the results of my skill performance tests Sending and preparing tribal and remote volleyball for the experimental and controlled groups, and there are no statistically significant differences between the results of the performance of the transmission and preparation skills of the volleyball between the two experimental and control groups, and the research co
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show More