Essential oils were extracted from Syzqiumoramac clove, Nigella sativa and eucalyptus oil for purpose of studying effect of these oils on adult cockroaches as repellents and extent of their attraction to them by treating biscuits with three concentrations (0.5, 0.25,1%). The results showed that clove oil was significantly more repellent than black seed oil at a concentration (1%), as average for five days was (0.32) compared to black seed oil (1.36). Insects attracted towards lunch averaged 7.58, 14 and this indicates fading of repellent effect due to penetration of the aroma of volatile clove oil. Results also showed that clove oil has a more lethal effect by direct spraying on nymphs and adults than black seed oil, as mortality in a specific time period of death for adults was 11.93 and nymphs 6.57, compared to black seed oil, the death rate of adults was 6.66, while for nymphs it was 3.46, which leads to the consideration of oil Clove oil has a more repellent and deadly effect than black seed oil.
Th paper scientifically deals with the Syrian crisis events erupted in 2011 using the historical descriptive and analytical approaches. The importance of the paper comes from the serious crisis that occurred in a region rich of historical crises, and natural resources attracting the attention of the major countries. The paper aims to show the Syrian crisis, its importance to Russia, the United States, and the regional countries, its impact on Russia economically and politically after the intervention, and Russia’s achievements on a global level holding the influential power on international decisions and other global events. The new Russian strategy has proven its worth in preserving its strategic interests as it could help the Syrian
... Show MoreAn experimental and numerical study was carried out to investigate the heat transfer by natural convection in a three dimensional annulus enclosure filled with porous media (silica sand) between two inclined concentric cylinders with (and without) annular fins attached to the inner cylinder under steady state condition. The experiments were carried out for a range of modified Rayleigh number (0.2 ≤Ra*≤ 11) and extended to Ra*=500 for numerical study and for annulus inclination angle of (δ = 0˚, 30˚, 60˚ and 90˚). The numerical study was to give the governing equation under assumptions that used Darcy law and Boussinesq’s approximation and then it was solved numerically using finite difference approximation. It was found that t
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreIn the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreCloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications. This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision wit
... Show MoreIn this paper, a new class of non-convex functions called semi strongly (