A prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of local bifurcation including Hopf bifurcation is investigated. Furthermore, to complete our study, the global dynamics of the model are investigated and the set of control parameters is set by conducting numerical simulations.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreSocial media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq
... Show More
Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
The research dealt with the effect of Kut Barrage on the geomorphological processes and the natural environment system in the course of the Tigris between the cities of Al-Ahrar and Kut in central Iraq. It was clear from the research the contribution of Kut Barrage in changing the surface runoff system between the front and back of the barrage, as well as changing the type of processes and the prevailing geomorphic forms, as the sedimentation activates the front of the barrage and erosion at its back, which affected the change in the morphology of the river, sediment retention at the front of the barrage, the burial of the bottom and reducing the validity of the stream. This also affects the efficiency of the barrage’s work and coastal er
... Show MoreThis study aimed to identify the role of servant leadership in promoting organizational citizenship behaviors in a sample of faculties of the University of Alqadisiya .It tried to answer several questions represented its problem.
The most important questions are the followings:
1- Is there enough perception among administrative leaders in the aforementioned faculties toward the concept of servant leadership? And under what level? &
... Show MoreABSTRACT
Metal (II) complexes of Co, Ni, Cu and Zn with cefdinir C14H13N5O5S2 derivative (L) were synthesized and identification by elemental analysis CHNS Uv-Vis, FTIR, TGA, metal analysis AA, magnetic susceptibility and conduct metric measurement. by analysis the ligand behaves as a bidentate. For the cobalt complex, Tetrahedral geometry shape was suggested, while other complexes that have nickel, copper and zinc ions were proposed as octahedral geometry shape. The experimental method was studied for prevention of corrosion carbon steel in 3.5% NaCl by using a novel Cefdinir derivations drugs. The results showed that metal complex was a strong corro
... Show MoreThe objective of this study was to investigate the effect of Royal jelly RJ on morphology and motility of mice sperms. Sperms were collected from the cauda region of the epididymis of each 10 mice from the treatment and control groups. Direct activation techniques and evaluation of sperm morphology were carried out. Dhino microscope was used for sperm measurement. The inspection was carried out in Salamatic laboratory for pathological analysis in 2015.The result revealed that all of the sperm function parameters registered significant activation in the treatment group. There was a significant increase in both the percentage of the sperm motility grade A and the progressive motility (A+B) of the treatment gr
... Show MoreDigital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-
... Show More