Fear, harvesting, hunting cooperation, and antipredator behavior are all important subjects in ecology. As a result, a modified Leslie-Gower prey-predator model containing these biological aspects is mathematically constructed, when the predation processes are described using the Beddington-DeAngelis type of functional response. The solution's positivity and boundedness are studied. The qualitative characteristics of the model are explored, including stability, persistence, and bifurcation analysis. To verify the gained theoretical findings and comprehend the consequences of modifying the system's parameters on their dynamical behavior, a detailed numerical investigation is carried out using MATLAB and Mathematica. It is discovered that the presence of these components enriches the system's dynamic behavior, resulting in bi-stable behavior.
Emotional exhaustion considered one of the critical factors in the formation and composition of organizational behavior of individuals within organizations, as well as social behavior and psychological, and emotional exhaustion is one of the three components of burnout, as well as depersonalization (cynicism) and low achievement, the emergence of research relevant to this concept began at the beginning of the seventies of the twentieth century, then started to become clear features in the eighties it. This research aims to build intellectual framework for draining emotional exhaustion through highlight on most important philosophical contents, as well as review and analysis of some models associated with this concept, and then a
... Show MoreArchitecture forms theoretical summaries and multi systems that have the essence of change, and that what distinguishes Architecture from other sciences and their systems. Architecture means way of life via its expressional products and that appears through its systems. These systems are based on formative and technological properties in form, structure, services and materials as well as
their moral forms. All these are associated with techniques and facilities in order to establish integrated system.
Architectural creation does not come from void but it depends on a conception base to create a new condition for creative architectural product. The general problem of the research concentrated on limited theoretical and practica
This paper deals with the description of the system of formation and derivation of words in the Russian language. In this work, we will present recent trends in the study of the Russian language that deal with vocabulary formation. The lexical system of the Russian language is associated with a common (or opposite) meaning; similar (or opposite) in stylistic characteristics; united by a common type of word formation; related to a common descent and belonging to a vocabulary of much or little use, etc. The results of the most prominent linguists and specialists who dealt with this topic will be presented, in addition to presenting their different views on word formation. The words of the Russian language consist of mor vimat that participate
... Show Moreالنظام السياسي اليمني : دراسة في المتغيرات الداخلية
The appearance of Mixed Mode Oscillations (MMOs) and chaotic spiking in a Light Emitting Diode (LED) with optoelectronic feedback theoretically and experimentally have been reported. The transition between periodic and chaotic mixed-mode states has been investigated by varying feedback strength. In incoherent semiconductor chaotically spiking attractors with optoelectronic feedback have been observed to be the result of canard phenomena in three-dimensional phase space (incomplete homoclinic scenarios).
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreIn the hybrid coolingsolar systems , a solar collectoris used to convertsolar energy intoheat sourcein order to super heat therefrigerant leave thecompressor,andthisprocess helpsin the transformation ofrefrigerant state from gaseous statetothe liquid statein upper two-thirdsof thecondenserinstead of the lower two-thirdssuchas in thetraditional air-conditioning systems and this willreduce theenergyneeded torun the process ofcooling.In this research two hybrid air-conditioning system with an evacuated tube solar collector were used, therefrigerant was R22 and the capacity was 2 tons each.The tilt angle of the evacuated tube solar collector was changed and the solar collector fluid was replaced into oil instead of water.A comparison wasi
... Show More