Triticale is a hybrid of wheat and rye grown for use as animal feed. In Florida, due to its soft coat, triticale is highly vulnerable to Sitophilus oryzae L. (rice weevil) and there is interest in development of methods to detect early-instar larvae so that infestations can be targeted before they become economically damaging. The objective of this study was to develop prediction models of the infestation degree for triticale seed infested with rice weevils of different growth stages. Spectral signatures were tested as a method to detect rice weevils in triticale seed. Groups of seeds at 11 different levels (degrees) of infestation, 0–62%, were obtained by combining different ratios of infested and uninfested seeds. A spectrophotometer was used to measure reflectance between 400 and 2500 nm wavelength for seeds that had been infested at different levels with six different growth stages from egg to adult. The reflectance data were analyzed by several generalized linear regression and classification methods. Different degrees of infestation were particularly well correlated with reflectances in the 400–409 nm range and other wavelengths up to 967 nm, although later growth stages could be detected more accurately than early infestation. Stepwise variable selection produced the lowest mean square differences and yielded a high R² value (0.988) for the 4th instars, pupae and adults inside the seed. Models were developed to predict the level of infestation in triticale by rice weevils of different growth stages. Overall, this study showed a great potential of using reflectance spectral signatures for detection of the level of infestation of triticale seed by rice weevils of different growth stages
Z-scan has been utilized for studying the non-linear properties and optical limiting behaviors of the dye Copper Phthalocyanine thin films. The refractive index is negative, which indicates a self-defocusing behavior and non-linear absorption coefficient (
Foodborne diseases are a major risk for human health. Millions of people become sick as a result of eating contaminated food with microorganisms that cause diseases. S. aureus is considered as one of the most important pathogenic bacteria, having the ability to activate certain genes that encode for heat stable enterotoxins and cause Staphylococcal food poisoning. Thus, this study aimed to determine the prevalence of multi resistant Staphylococcus aureus that produce enterotoxins in different sources of food . Forty nine isolates were identified as S.aureus, according to morphological and biochemical tests. They were isolated from 387 different food samples from several randomly covered restaurants
... Show MoreIn this paper deals with the effect laser irradiation on the optical properties of cobalt oxide (CoO2) thin films and that was prepared using semi computerized spray pyrolysis technique. The films deposited on glass substrate using such as an ideal value concentration of (0.02)M with a total volume of 100 ml. With substrate temperature was (350 C), spray rate (15 ml/min).The XRD diffraction given polycrystalline nature with Crystal system trigonal (hexagonal axes). The obtained films were irradiated by continuous green laser (532.8 nm) with power 140 mW for different time periods is 10 min,20min and 30min. The result was that the optical properties of cobalt oxide thin films affe
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreIn this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
In the present paper, Arabic Character Recognition Edge detection method based on contour and connected components is proposed. First stage contour extraction feature is introduced to tackle the Arabic characters edge detection problem, where the aim is to extract the edge information presented in the Arabic characters, since it is crucial to understand the character content. The second stage connected components appling for the same characters to find edge detection. The proposed approach exploits a number of connected components, which move on the character by character intensity values, to establish matrix, which represents the edge information at each pixel location .
... Show MoreFinancial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin