The present study introduces description of new species of leafhopper Cicadella latreilla nov. External morphological characters particularly female genitalia were discussed and illustrated, shape of male abdominal apodeme, chaetotaxy of genital style and genital plate of male genitalia, shape of Aedeagus and connective . The external morphological characters were: spotting patterns of vertex, face, pronotum of prothorax, and metothorax, and of lower and upper valves of ovipositors,shape of female seventh abdominasternum.
The heat exchanger is a device used to transfer heat energy between two fluids, hot and cold. In this work, an output feedback adaptive sliding mode controller is designed to control the temperature of the outlet cold water for plate heat exchanger. The measurement of the outlet cold temperature is the only information required. Hence, a sliding mode differentiator was designed to estimate the time derivative of outlet hot water temperature, which it is needed for constructing a sliding variable. The discontinuous gain value of the sliding mode controller is adapted according to a certain adaptation law. Two constraints which imposed on the volumetric flow rate of outlet cold (control input) were considered within the rules of the proposed
... Show MoreIn this paper, previous studies about Fuzzy regression had been presented. The fuzzy regression is a generalization of the traditional regression model that formulates a fuzzy environment's relationship to independent and dependent variables. All this can be introduced by non-parametric model, as well as a semi-parametric model. Moreover, results obtained from the previous studies and their conclusions were put forward in this context. So, we suggest a novel method of estimation via new weights instead of the old weights and introduce
Paper Type: Review article.
another suggestion based on artificial neural networks.
Topic management is the awareness of how speakers deal with initiating, developing, changing, and ending a topic and how they fix the relationship when a misunderstanding occurs. It is such an important unit of conversation as it includes the transition from one strategy to the other to be accomplished in a systematic and orderly manner. These strategies are impaired in dementia patients thus lead to communication breakdown. This study aims at detecting the dementia patients' topic management strategies in selected speeches and answering the questions of which of these strategies are fully or partially detected in these speeches. The researchers use a qualitative method to examine the speeches of those patients and they adopt an eclectic
... Show MoreBackground: Obesity tends to appear in modern societies and constitutes a significant public health problem with an increased risk of cardiovascular diseases.
Objective: This study aims to determine the agreement between actual and perceived body image in the general population.
Methods: A descriptive cross-sectional study design was conducted with a sample size of 300. The data were collected from eight major populated areas of Northern district of Karachi Sindh with a period of six months (10th January 2020 to 21st June 2020). The Figure rating questionnaire scale (FRS) was applied to collect the demographic data and perception about body weight. Body mass index (BMI) used for ass
... Show MoreMeasurement of construction performance is essential to a clear image of the present situation. This monitoring by the management team is necessary to identify locations where performance is exceptionally excellent or poor and to identify the primary reasons so that the lessons gained may be exported to the firm and its progress strengthened. This research attempts to construct an integrated mathematical model utilizing one of the recent methodologies for dealing with the fuzzy representation of experts’ knowledge and judgment considering hesitancy called spherical fuzzy analytic hierarchy process (SFAHP) method to assess the contractor’s performance per the project performance pa
The advancement of digital technology has increased the deployment of wireless sensor networks (WSNs) in our daily life. However, locating sensor nodes is a challenging task in WSNs. Sensing data without an accurate location is worthless, especially in critical applications. The pioneering technique in range-free localization schemes is a sequential Monte Carlo (SMC) method, which utilizes network connectivity to estimate sensor location without additional hardware. This study presents a comprehensive survey of state-of-the-art SMC localization schemes. We present the schemes as a thematic taxonomy of localization operation in SMC. Moreover, the critical characteristics of each existing scheme are analyzed to identify its advantages
... Show MoreFace recognition system is the most widely used application in the field of security and especially in border control. This system may be exposed to direct or indirect attacks through the use of face morphing attacks (FMAs). Face morphing attacks is the process of producing a passport photo resulting from a mixture of two images, one of which is for an ordinary person and the other is a judicially required. In this case, a face recognition system may allow travel of persons not permitted to travel through face morphing image in a Machine-Readable Electronic Travel Document (eMRTD) or electronic passport at Automatic Border Control (ABC) gates. In creating an electronic passport, most countries rely on applicant to submit ima
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show More