Triticale is a hybrid of wheat and rye grown for use as animal feed. In Florida, due to its soft coat, triticale is highly vulnerable to Sitophilus oryzae L. (rice weevil) and there is interest in development of methods to detect early-instar larvae so that infestations can be targeted before they become economically damaging. The objective of this study was to develop prediction models of the infestation degree for triticale seed infested with rice weevils of different growth stages. Spectral signatures were tested as a method to detect rice weevils in triticale seed. Groups of seeds at 11 different levels (degrees) of infestation, 0–62%, were obtained by combining different ratios of infested and uninfested seeds. A spectrophotometer was used to measure reflectance between 400 and 2500 nm wavelength for seeds that had been infested at different levels with six different growth stages from egg to adult. The reflectance data were analyzed by several generalized linear regression and classification methods. Different degrees of infestation were particularly well correlated with reflectances in the 400–409 nm range and other wavelengths up to 967 nm, although later growth stages could be detected more accurately than early infestation. Stepwise variable selection produced the lowest mean square differences and yielded a high R² value (0.988) for the 4th instars, pupae and adults inside the seed. Models were developed to predict the level of infestation in triticale by rice weevils of different growth stages. Overall, this study showed a great potential of using reflectance spectral signatures for detection of the level of infestation of triticale seed by rice weevils of different growth stages
In this paper, we use concepts and results from percolation theory to investigate and characterize the effects of multi-channels on the connectivity of Dynamic Spectrum Access networks. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from-a phenomenon which we define as channel abundance. To cope with the existence of multi-channels, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocol, it becomes difficult for two nodes to agree on a common channel, thereby potentially remaining invisible to each other. We model this
... Show MoreHonorifics are linguistic expressions which maintain social as well as religious respect to other people. They are linguistic techniques which express politeness to other interlocutors. Semantically speaking, honorifics are of two types: al-Laqab (title) and al-Kuniya (teknonyms) following a specific word order. They form part of the Arab recognitions and are mold into their social and communicative competence.
The study focuses upon religious and regional honorifics which convey deference and respect. It assumes that religious and cultural recognitions play vital roles in formulating and embedding the sense of honorifics. It is hypothesized that Arab people express respect to religious personalitie
... Show MoreThis paper presents the concepts of prepaths, paths, and cycles in α-topological spaces and studies them in orderable spaces. Also, many relationships are proved with their equivalences using some properties in topological spaces like compactness and locally connectedness.
The subject of the tagged research (becoming and integration of the film in postmodern cinema) is summarized by studying the transformations and complementarity of the film in light of the emergence of the concern of postmodernism. Then the need for it, as well as the objectives of the research and clarify its limits, as well as its importance. Then the transition to the theoretical framework, which included two sections, the first topic was entitled: Postmodern Cinema Formation and Completion, while the second topic was entitled: Paradox in Postmodern Film.
After completing the theoretical aspect, the research concluded with a number of theoretical framework indicators that were adopted as a tool for analyzing the sample, then th
... Show MoreThis study evaluates the advantages of employing nano-hydroxyapatite in dentistry, particularly for preventive treatment applications. Only electronically published papers were searched within this review. Sources: "PubMed" website was the only source used to search for data. 92 most relevant papers to the topic were selected, especially the original articles and review papers, from 1990 till the 1st of April 2022. The morphology of nano-hydroxyapatite, as well as the structure of its crystals, are close to that of dental enamel. As a result, hydroxyapatite can biomimetically replace the natural enamel mineral element. Keywords: remineralization of enamel, nanotechnology, nanohydroxyapatite, hypersensitivity.
And after:
There are many aspects of inference in the Holy Qur’an, whether it is evidence, evidence, argument, authority, or proof.
These expressions or expressions are close in meaning to each other in appearance, but the Qur’an used them all in their exact place, so every word in the Qur’an has its own use that was set for it, and no other word can replace it even if it is close in meaning to it. And these aspects that the Qur’an mentioned as evidence for the aspects of inference in it may come to be mental, textual, or tactile evidence.
The Qur’an exalted the importance of evidence and proof in its religion, and entrusted it with confirming and rejecting the plaintiff’s claim, regardless of its subject matter
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreOld Iraq includes the first experiences in establishing the first residential settlements in the Mesopotamian, and model villages designed and the pulp units in it and their natural matter, that made it perennial, and construction continues until now with it. These experiences were the basis for the emergence of the Iraqi civilization and thus the world and the beginning of writing, trade and the religions of the divine since before history, and then the Sumerian, Babylonian and Assyrian civilizations, and their villages that formed the Fertile Crescent.
There is a lack of knowledge and disregard for the distant and near history of Iraq in the field of rural housing, despite Iraq's leadership in this field, with the aim of the re
... Show MoreAndrogenetic alopecia (AGA) or baldness is a common form of hair loss, affecting men more than women .The exact causes and pathogenesis of baldness are not well understood. A search for new drug is still needed. This study aims to evaluate the role of gonadotropins hormones in hair loss in males and its possibility to be used as treatment target. A total of 78 volunteers 43 with baldness and 35 healthy men were participated in this study. Their age ranged between (20-49) years, the studied groups were divided into two categories: firstly according to age (group1: 20-29 year), (group2: 30-39 year),and (group3: 40-49 year).Secondly according to baldness degree. LH and FSH were measured by using Enzyme Linked Immunosorbent Assay (ELISA) kits.
... Show MoreThis paper is devoted to the discussion the relationships of connectedness between some types of graphs (resp. digraph) and Gm-closure spaces by using graph closure operators.