In this study, functional and numerical response tests, which are important components in the selection of biological control agent, were carried out. In functional response trials, the amount of food consumed, attack rate (a) and handling time (Th) were calculated for each developmental period, depending on the number of preys given after 24 hours. The obtained results were evaluated with the Holling. In numerical response experiments, the development of the predator insect was examined depending on the number of preys given in certain numbers (5, 10, 20, 40 and 80) and the data were recorded. This phase of the trials continued until the individuals died. At this stage of the trials, the reproductive response of the p
... Show MoreThe performance of a synergistic combination of electrocoagulation (EC) and electro-oxidation (EO) for oilfield wastewater treatment has been studied. The effect of operative variables such as current density, pH, and electrolyte concentration on the reduction of chemical oxygen demand (COD) was studied and optimized based on Response Surface Methodology (RSM). The results showed that the current density had the highest impact on the COD removal with a contribution of 64.07% while pH, NaCl addition and other interactions affects account for only 34.67%. The optimized operating parameters were a current density of 26.77 mA/cm2 and a pH of 7.6 with no addition of NaCl which results in a COD removal efficiency of 93.43% and a specific energy c
... Show MoreThe success of any media work in our contemporary life is based on proper planning. Television in Iraq is like any media outlet that adopts clear planning and programming in order to achieve the goals set in the news, entertainment, education. Iraq TV relies on four programming plans in one year (short term), but we often receive central instructions directly from the Minister of Information ordering to cancel the program plan and what was scheduled for broadcast to be finally replaced by alternative or emergency program associated with an incident, occasion or important news, these programs are all called (emergency programs).
In this present research we will be dealing with these programs as well as the extent of their impact o
... Show MoreA new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis research is a critical methodological study deals with some Quranic verses abrogative,abrogated.
by Ibn al-Jawzi (may Allah have mercy on him) in his book (Tafseer Zad al-Maseer) inin Surah Al-Baqara the in the holy Quraan.