In this paper, the dynamics of scavenger species predation of both susceptible and infected prey at different rates with prey refuge is mathematically proposed and studied. It is supposed that the disease was spread by direct contact between susceptible prey with infected prey described by Holling type-II infection function. The existence, uniqueness, and boundedness of the solution are investigated. The stability constraints of all equilibrium points are determined. In addition to establishing some sufficient conditions for global stability of them by using suitable Lyapunov functions. Finally, these theoretical results are shown and verified with numerical simulations.
Research summary: The current research aims to identify:
1-Mental wandering among university students 2- Attentioncontrol among universitey students. 3- The relationship between mental wandering and attention control among university students. 4- The difference in the relationship among university students: accoerding to a- the gender variable (males - females) b- according to the specialization variable) Scientific-human), and the results of the current research reached the following: 1- University students have mental wandering associated with the task, and mental wandering that is not related to the task. 2- University students have attentive control 3- There is no relationship between mental wandering associated with task and
... Show MoreIn recent years, there is more interest in water sources availability, including groundwater due to an increase in demand for water because of the increasing population in the world, and the water recedes due to climate change also. Therefore, the study of groundwater has required more attention. The aim of the present study is to establish a MODFLOW model in the groundwater modeling system software to simulate the movement of groundwater in the Turssaq alluvial fan which is located in the Qazaniyah city, east of Diyala Governorate. The solid model was used to define the aquifer in the study area. Using the GIS software, mapping and preparing the data needed to create a conceptual model were carried out. The data of the
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreCultural and identity scars have been engraved in the body of ethnic minority of Muslims in America due to the bloody attacks of 9/11. These events have created thus traumatic experiences on the party who witnessed the events at close and the people on whom the blame is conclusively directed, Muslim Americans. For Americans, the attacks resulted in a proud reassertion of the national virtue and communal integrity from which Muslim Americans were excluded. This reassertion is accompanied for Muslims by a reconstruction of a cultural identity away from their origin homeland and under pressures and prejudices that made the process of reconstruction to be severely challenging. Accordingly, the challenge needed to be portrayed to overcome the d
... Show MoreAbstract
One of the major components in an automobile engine is the throttle valve part. It is used to keep up with emissions and fuel efficiency low. Design a control system to the throttle valve is newly common requirement trend in automotive technology. The non-smoothness nonlinearity in throttle valve model are due to the friction model and the nonlinear spring, the uncertainty in system parameters and non-satisfying the matching condition are the main obstacles when designing a throttle plate controller.
In this work, the theory of the Integral Sliding Mode Control (ISMC) is utilized to design a robust controller for the Electronic Throttle Valve (ETV) system. From the first in
... Show MoreAbstract: Aluminum alloys grade 6061-T6 are characterized by their excellent properties and processing characteristics which make them ideal for varieties of industrial applications under cyclic loading, aluminum alloys show less fatigue life than steel alloys of similar strength. In the current study, a nanosecond fiber laser of maximum pulse energy up to 9.9 mJ was used to apply laser shock peening process (LSP) on aluminum thin sheets to introduce residual stresses in order to enhance fatigue life under cyclic loading Box-Behnken design (BBD) based on the design of experiments (DOE) was employed in this study for experimental design data analysis, model building and optimization The effect of working parameters spot size (ω), scannin
... Show MoreThis paper presents a point multiplication processor over the binary field GF (2233) with internal registers integrated within the point-addition architecture to enhance the Performance Index (PI) of scalar multiplication. The proposed design uses one of two types of finite field multipliers, either the Montgomery multiplier or the interleaved multiplier supported by the additional layer of internal registers. Lopez Dahab coordinates are used for the computation of point multiplication on Koblitz Curve (K-233bit). In contrast, the metric used for comparison of the implementations of the design on different types of FPGA platforms is the Performance Index.
The first approach attains a performance index
... Show MoreHR Al-Hamamy, KE Sharquie, AA Noaimi, WN Hussein, Our Dermatology Online, 2014 - Cited by 6