The following dilution 5×10-1, 10-1, 10?2 , 10-3 gm/L for the indigenous isolate of Bacillus thuringiensis bacteria and the commercially isalate were used for experiments against the different stages of fig moth of E.cautella which exposed by filter paper method. The results showed that mortality of larval stages was increased with the increasing concentration of the biocide, in addition to increase in the mortality of the larval stages reached to the highest percentage in the third days of treatment of the larval stage in comparison with the first and second days of exposure. The results also showed that the sensitivity of larval stages was increased in first and second instars while reduced in the last instars .The high percentage of first instar mortality for the indigenous isolate in the concentration of 5×10-1 was 72.8% , while the low percentage of mortality showed in the concentration of 5×10-1 for the fifth instar larvae which was 13.3% in third days of treatment while a high percentage of mortality was showed for the first instar larvae for the commercially isulate in the concentration of 5×10-1 was 59.4% Furthermore, low percentage of mortality was shown in the concentration of 5×10-1 in fifth instar larval which was 8.3% in the third days of treatment. The results also showed that the indigenous isolated was more effective than the commercially produced bacteria for killing larval instars of fig moth E.cautella .The total percentage of larval instar mortality reached to 44.5 % after the third days of treatment in concentration 5×10-1 in the indigenous isolate , and it was 33.8 % in the commercially produced bacteria .
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreVol. 6, Issue 1 (2025)
For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreThe relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.