In this study, a mathematical model is presented to study the chemisorption of two interacting atoms on solid surface in the presence of laser field. Our mathematical model is based on the occupation numbers formula that depends on the laser field which we derived according to Anderson model for single atom adsorbed on solid surface. Occupation numbers formula and chemisorption energy formula are derived for two interacting atoms (as a diatomic molecule) as they approach to the surface taking into account the correlation effects on each atom and between atoms. This model is characterized by obvious dependence of all relations on the system variables and the laser field characteristics which gives precise description for the molecule –
... Show MoreAtmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geom
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreA mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreUsing a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were spe
... Show MoreThe avoidance strategy of prey to predation and the predation strategy for predators are important topics in evolutionary biology. Both prey and predators adjust their behaviors in order to obtain the maximal benefits and to raise their biomass for each. Therefore, this paper is aimed at studying the impact of prey’s fear and group defense against predation on the dynamics of the food-web model. Consequently, in this paper, a mathematical model that describes a tritrophic Leslie-Gower food-web system is formulated. Sokol-Howell type of function response is adapted to describe the predation process due to the prey’s group defensive capability. The effects of fear due to the predation process are considered in the first two levels
... Show MoreA nano manganese dioxide (MnO2) was electrodeposited galvanostatically onto a carbon fiber (CF) surface using the simple method of anodic electrodeposition. The composite electrode was characterized by field emission scanning electron microscopy (FESEM), and X-ray diffraction (XRD). Very few studies investigated the efficiency of this electrode for heavy metals removal, especially chromium. The electrosorption properties of the nano MnO2/CF electrode were examined by removing Cr(VI) ions from aqueous solutions. NaCl concentration, pH, and cell voltage were studied and optimized using the Box-Behnken design (BDD) to investigate their effects and interactions on the electrosorption process. The results showed that the
... Show MoreThe study aimed at interpreting the role of architectural design quality in in build competitiveness model in accordance with the proposal included the idea of architectural design quality for its removal; interesting design factors of the environment, good design of the spaces, and design aesthetic explanatory variable. The competitiveness dimensions; the level of innovation, stimulate research, and the quality of the company's products, and activating the role of human resources, entrepreneurship, profitability, market share and competitiveness, variable responsive. The study of construction companies in the Ministry of Housing and Construction has taken the Iraqi society for the study. The sample consisted of (48) manage
... Show More