Many biological tests were done to study the effect of the crude alcoholic leaves extracts on the biological characteristics at the larvae fruit fly Ceratitis capitata with different concentrations of the extracts exposed 1,2,3,5 and 7.5 % at constant laboratory conditions includes the temperature and the relative humidity (27±2C0&70±5 % respectively). The results of the experiments showed that the alcoholic extracts of the plant effected the growth and the development of the larvae and pupae according to the concentrations . The alcoholic extracts proved to have the highest mortality tend to 66.76 % in larva treated with alcoholic at concentration 7.5 % the result also showed that, there was no signifecant differences on the perid of larva pupation that treated with the different concentration.
Many researchers used different methods in their investigations to enhance the heat transfer coefficient, one of these methods is using porous medium. Heat transfer process inside closed and open cavities filled with a fluid-saturated porous media has a considerable importance in different engineering applications, such as compact heat exchangers, nuclear reactors and solar collectors. So, the present paper comprises a review on natural, forced, and combined convection heat transfer inside a porous cavity with and without driven lid. Most of the researchers on this specific subject studied the effect of many parameters on the heat transfer and fluid field inside a porous cavity, like the angle of inclination, the presenc
... Show Moreoptical properties of pure poly(vinyl Alcohol) films and poly(vinyl Alcohol) doped with methyl red were study, different percentage prepared with constant thickness using casting technique. Absorption, Transmission spectra have been recorded in order to study the optical parameters such as absorption coefficient, energy gap, refractive index, Extinction coefficient and dispersion parameters were measured in the wavelength range (200-800)nm. This study reveals that the optical properties of PVA affect by increasing the impurity concentration.
With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show MoreAn oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification
... Show MoreThis study seeks to define the idea of abstraction in the rules of criminalization and punishment and to indicate the extent of privacy that it enjoys in the field of criminalization and punishment, which is represented in the fact that it is not absolute as in the general legal rule, but rather it is restricted by several restrictions, which are due to the nature of this law and the basic functions it performs in society and the nature of The penalties it contains and its aim, which is represented in achieving public deterrence, private deterrence, and justice. This study also explains the importance of abstraction in the rules of criminalization and punishment, represented in achieving justice and equality among all individuals,
... Show MoreTransformation and many other substitution methods have been used to solve non-linear differential fractional equations. In this present work, the homotopy perturbation method to solve the non-linear differential fractional equation with the help of He’s Polynomials is provided as the transformation plays an essential role in solving differential linear and non-linear equations. Here is the α-Sumudu technique to find the relevant results of the gas dynamics equation in fractional order. To calculate the non-linear fractional gas dynamical problem, a consumer method created on the new homotopy perturbation a-Sumudu transformation method (HP TM) is suggested. In the Caputo type, the derivative is evaluated. a-Sumudu homotopy pe
... Show MoreIn this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons
... Show MoreHumans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.
The refractive index sensors based on tapered optical fiber are attractive for many industries due to sensing capability in a variety of application. In this paper, we proposed a refractive index sensor based on multicore fiber (MCF) sandwiched between two standard single mode fibers (SMF). The sensor consisting of three sections, SMF- MCF-SMF is structurally simple and can be easily produced by joining these parts. The MFC contains seven cores and these cores are surrounded by a single cladding. The sensing region is obtained by tapering the MCF section where the evanescent field is generated. The single mode propagating along the SMF is stimulated at the first joint and is coupled to the cladding modes. These modes interfere with the core
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More