The mathematical construction of an ecological model with a prey-predator relationship was done. It presumed that the prey consisted of a stage structure of juveniles and adults. While the adult prey species had the power to fight off the predator, the predator, and juvenile prey worked together to hunt them. Additionally, the effect of the harvest was considered on the prey. All the solution’s properties were discussed. All potential equilibrium points' local stability was tested. The prerequisites for persistence were established. Global stability was investigated using Lyapunov methods. It was found that the system underwent a saddle-node bifurcation near the coexistence equilibrium point while exhibiting a transcritical bifurcation near the vanishing and predator-free equilibrium points. The analytical results are then validated using a numerical approach. It is discovered that the cooperative hunting rate and conversion rate persistently affect the system. In contrast, the anti-predator rate leads to the extinction of the predator.
Silver sulfide and the thin films Ag2Se0.8Te0.2 and Ag2Se0.8S0.2 created by the thermal evaporation process on glass with a thickness of 350 nm were examined for their structural and optical properties. These films were made at a temperature of 300 K. According to the X-ray diffraction investigation, the films are polycrystalline and have an initial orthorhombic phase. Using X-ray diffraction research, the crystallization orientations of Ag2Se and Ag2Se0.8Te0.2 & Ag2Se0.8S0.2 (23.304, 49.91) were discovered (XRD). As (Ag2Se and Ag2Se0.8Te0.2 & Ag2Se0.8S0.2) absorption coefficient fell from (470-774) nm, the optical band gap increased (2.15 & 2 & 2.25eV). For instance, the characteristics of thin films made of Ag2Se0.8Te0.2 and Ag2Se0.8S0.2
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreIn this work, electrochemical process was presented to polymerized eugenol on Gr.2 and Gr.5 titanium alloys before and after treated by Micro Arc Oxidation (MAO), where Gr.2 is commercial pure titanium and Gr.5 is Ti-6Al-4V dental alloys. The deposited layers were characterized by scanning electron microscopy (SEM), energy-dispersive X-ray spectroscopy (EDS), X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The adhesion strength of polymeric thin-film was estimation by using pull-off adhesion test and the result was the adhesion strength of PE was (1.23 MPa) on Gr.2 before MAO and increase to (1.98 MPa) on Gr.2 after MAO treatment. The corrosion behavior of Gr.2 and Gr.5 alloy in artificial saliva environment at
... Show MoreThe genus of Chrysobothris Eschscholtz, 1829 is one of the most diverse and widespread genera of the family Buprestidae of some 700 described species distributed throughout the world. In Iraq, particularly in the Kurdistan region, about 4 species had been recorded so far, many of these species are sympatric, share larval host plants, and are difficult to reliably separate morphologically. The current study investigates species limits and relationships among the recognized species occurring within the Erbil Province; mitochondrial cytochrome C oxidase (COX I) molecular analysis confirmed the monophyly of two Chrysobothris species, Ch. affinis (Fabricius, 1794) and Ch. chrysostigma (Linnaeus, 1758). Implications of the resultant larval mor
... Show MoreA series of Schiff base-bearing salicylaldehyde moiety compounds (1-4) had been designed, synthesized, subjected to insilico ADMET prediction, molecular docking, characterization by FT-IR, and CHNS analysis techniques, and finally to their Anti-inflammatory profile using cyclooxygenase fluorescence inhibitor screening assay methods along with standard drugs, celecoxib, and diclofenac. The ADMET studies were used to predict which compounds would be suitable for oral administration, as well as absorption sites, bioavailability, TPSA, and drug likeness. According to the results of ADME data, all of the produced chemicals can be absorbed through the GIT and have passed Lipinski’s rule of five. Through molecular docking with PyRx 0.8, these
... Show MoreThe philosopher and social psychologist Erich Fromm (1900-1980), in his book "Escape from Freedom" highlighted the distinction between the "I" of the authoritarian personality and the "I" of the destructive personality based on their stance towards "the other." The former (the authoritarian self) relies on a submissive, enslaving formula, where the "I" is the master/dominator/controller/strong, while "the other" is the servant/submissive/controlled/weak, essential for perpetuating this formula. In contrast, the latter (the destructive self) relies on an annihilating, negating formula, where the "I" is existence/killer/destroyer/pe
... Show MoreKE Sharquie, JR Al-Rawi, AA Noaimi, MM Jabir, Iraqi Postgraduate Medical Journal, 2009
S Khalifa E, AR Jamal R, N Adil A, J Munqithe M…, 2009