A modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify the validity of the theoretical analysis and visualize the model dynamics.
A new, easy‐to‐manufacture, and low‐cost integrated cubical solar collector tank for domestic usage is concerned in this work. Three models are prepared, side by side, and tested to point out their seasonal performance. Tank Model I has three vertical sides, black painted and glazed to act as an absorber; the other sides are insulated. Tank Model II has two black painted and glazed sides, with four insulated surfaces. The models are south‐oriented at different positions and tested versus the conventional tank (Model III) to validate and assess their performance in summer and winter. In summer, the temperatures in Models I and II are lower than those for Model III since they have insulated sid
Linear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan
... Show MoreIn this research, salbutamol sulphate (SAS) has been determined by a simple, rapid and sensitive spectrophotometric method. Salbutamol sulphate in this method is based on the coupling of SAS with diazotized ρ- bromoaniline reagent in alkaline medium of Triton X-100 (Tx) to form an orange azo dye which is stable and water-soluble. The azo dye is exhibiting maximum absorption at 441 nm. A 10 - 800 µg of SAS is obeyed of Beer's law in a final volume of 20 ml, i.e., 0.5- 40 ppm with ε, the molar absorptivity of 48558 L.mol-1.cm-1 and Sandell's sensitivity index of 0.01188 µg.cm-2. This new method does not need solvent extraction or temperature control which is well applied to determine SAS in d
... Show MoreBathyplectes curcurlionis (Thomson) is the sole parasitoid encountered in west Baghdad parasitising larvae of alfalfa weevil Hypera postica (GylIenhal). Percent of parasitisation did not exceed 8% in 1989 and 1990 and overall rate of parasitisation was 5%. Additional reduction in percent of parasitisation caused by presence of the fungal pathogen Erynia phytonomi. High survival percent of weevil's larvae under the study conditions explains why this insect is a key pest of alfalfa. Suggestions were made to inhance the role of B. curcurtionis in controlling the weevil.
This study aims to evaluate drinking water quality at the Al Wahda plant (WTP) in Baghdad city. A conventional water treatment plant with an average flow rate of 72.82 MLD. Water samples were taken from the influent and effluent of the treatment plant and analyzed for some physicochemical and biological parameters during the period from June to November 2020. The results of the evaluation indicate that treated water has almost the same characteristics as raw water; in other terms, the plant units do not remove pollutants as efficiently as intended. Based on this, the station appears to be nothing more than a series of water passage units. However, apart from Total dissolved solids, the mean values of all parameters in the study were
... Show MoreThis research deals with the fact that arts exit from their familiar context in practice and enter in the context of the fantasy and exoticism picture. In order to understand the theatrical phenomenon and know the way of its production of the fantasy picture, especially the acting performance in its transitions between the real and fantasy. This study consists of: an introduction of the research in which the researcher presented the research problem, importance and objectives.
The theoretical framework dealt with founding a theoretical part for the research consisting of two sections: the first (fantasy: the concept and the working) and the second (techniques of acting perfo
... Show MoreBackground: 37% phosphoric acid (PA) is the traditional enamel etching technique prior to bracket adhesion, yet it has been implicated in numerous enamel injuries. The purpose of the current study was to create a calcium phosphate (CaP) etching paste in a simplified capsule formula that can underpin clinically adequate bracket bond strength without jeopardizing the integrity of enamel upon the debracketing procedure. Materials and Methods: micro-sized hydroxyapatite (HA) powder was mixed with 40% PA solution to prepare experimental acidic CaP paste. Sixty human premolars were assigned into two groups of 30 each. Enamel conditioning was accomplished using 37% PA-gel for control group and CaP paste for e
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More