A prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of local bifurcation including Hopf bifurcation is investigated. Furthermore, to complete our study, the global dynamics of the model are investigated and the set of control parameters is set by conducting numerical simulations.
Form recurrence of financial crises phenomenon disturbing and attention , and returns the reasons so that its negative effects were sharp and dangerous , because of the nature and cause of Ncaha , threatened political and economic stability of the countries in which they occur these crises , in addition to Machmlh these crises spread of contagion across multiple channels to include other countries many developed and developing , and the reason for this to the openness of the economic and financial witnessed by the countries affected by crises and other countries concerned, the financial crisis is a case of financial turmoil appears in one of the sections of the financial system one and extends to
... Show MoreThe fluctuations in oil prices in world markets affect the general budget and the trade balance of the rent countries, because oil is a strategic commodity affected by economic and political factors. The fluctuations in oil prices affect the public budgets of the rent countries through the public revenue side of oil revenues. On the other hand, these fluctuations affect the balance of trade through the volume of oil exports, which lead to imbalance of trade surplus or deficit . &nbs
... Show MoreDiabetes mellitus type II is a disorder of metabolism and complex diseases affected by genetic environmental factors and associated with inflammation. The symptoms of type II diabetes develop gradually, which are associated with increased blood concentration of marker of the endothelial inflammatory factors. The expression of adhesion molecules, including E-selectin, intracellular adhesion molecule-1(ICAM-1) and vascular cell adhesion molecule-1 (VCAM-1) on the surface of vascular endothelial cells to help leukocyte stick to other surrounding tissues. Many researchers have made attempts to determine the significance of particular ABO phenotype for the susceptibility to diseases. Many reports show a strong association with the ABO blood grou
... Show MoreThe goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b
With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThe research aims to know the impact of the innovative matrix strategy and the problem tree strategy in teaching mathematics to intermediate grade female students on mathematical proficiency. To achieve the research objectives, an experimental approach and a quasi-experimental design were used for two equivalent experimental groups. The first is studied according to the innovative matrix strategy, the second group is studied according to the problem tree strategy. The research sample consisted of (32) female students of the first intermediate grade, who were intentionally chosen after ensuring their equivalence, taking into several factors, most notably (chronological age, previous achievement, and intelligence test). The research tools con
... Show MoreThe study aims to highlighting the Creative Accounting practices, identifying their impact on non reliability of financial statement of Insurance companies and Iraqi Public Reinsurance Company. Certain executive managements resort to creative accounting to falsely portray a better image to financial statement users by means of a set of techniques and mechanisms. Thus, impacting the company activities, The study was carried out in state insurance companies and Iraqi Public Reinsurance Company. Miller model is adopted to measure earning management practices. It is one of the tools to detect creative accounting practices and to measure reliability of accounting information of financial statements by applying “White” scale on
... Show MoreThe research aims at measuring the extent of the relationship and influence of the indicators of the Core competencies of the audit firms and offices in the Earning Quality of the private banks listed in the Iraq Stock Exchange under audit. The research community represents 38 banks. The sample of the research has been approved only 10 banks continue to issue their financial statements for the period (2007 – 2017), in addition to the audit offices assigned to audit these banks, which amounted to 14 companies and auditing offices. John's (1999) model revised by Kothari et al., (2005) was adopted to measure the Earning Quality by finding discretionary accruals and non-discretionary accruals, to measure the Core competencies indicators ,
... Show More