This study was carried out in the bee laboratory in the Faculty of Agriculture –University of Kufa in September 2021 to evaluate some protein sources and hive products against the oriental hornet Vespa orientalis Linnaeus 1771 (Hymenoptera: Vespidae). The food sources included: beef meat, gut fish, beef lung, honeybee, wax, propolis, pollen, bee worker, and water, in addition to control which was an empty petri dish. The number of visits and their duration were calculated. The results showed that the wasps preferred bee honey and wax significantly higher than the rest of the stimuli.
The aim of this paper is to introduce the concept of N and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.
The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreBackground: Lamotrigine is a second generation Anti-epileptic drug; it is widely used for the treatment of epilepsy and bipolar disorder. Sufficient data is not available concerning its teratogenicity. Aim of the study: The study has been carried out to evaluate the effect of lamotrigine on Rat kidney development. Materials and Methods: The study was conducted on 10 pregnant Albino Rats (Rattus rattus) divided equally into two groups, control and experiment groups. Experiment group received lamotrigne 10mg/kg/day orally using naso-gastric tube from the first day of gestation until the first week after birth, while the control group received distilled water. Newborn kidneys were collected at day 7 postnatal and fixated in bouin’s solution,
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreIn this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
The main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThe research tackles the potential challenged faced the translator when dealing with the literal translation of nowadays political terms in media. Despite the universal complexity of translating political jargon, adopting literal translation introduces an added layer of intricacy. The primary aim of literal translation is to maintain faithfulness to the original text, irrespective of whether it is in English or Arabic. However, this method presents several challenges within the linguistic and cultural dimensions. Drawing upon scholarly sources, this article expounds upon the multifaceted issues that emerge from the verbatim translation of political terms from English into Arabic. These problems include political culture, language differenc
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show More