Watermelon is known to be infested by multiple insect pests both simultaneously and in sequence. Interactions by pests have been shown to have positive or negative, additive or non additive, compensatory or over compensatory effects on yields. Hardly has this sort of relationship been defined for watermelon vis-à-vis insect herbivores. A 2-year, 2-season (4 trials) field experiments were laid in the Research Farm of Federal University Wukari, to investigate the interactive effects of key insect pests of watermelon on fruit yield of Watermelon in 2016 and 2017 using natural infestations. The relationship between the dominant insect pests and fruit yield were determined by correlation (r) and linear regression (simple and multiple) analyses. Multimodel inference was used to define the predictor that impacted on fruit yield the most. Results indicated that, each pest had highly negative and significant (p < 0.05) impact on yield (range of r = -0.78 to -0.92), and that the coefficient of determination (R2) values (which were indicative of the effect of pests or their complexes on yield) did not rise on addition of interaction terms. This reveals a non additive negative impact of insect interactions on the fruit yield of watermelon. This may be due to among others; competition by the pest, phenology, plant defenses or changes in nutritional content of the plant. The need to therefore employ discriminate analysis to ascertain the contribution of each pest to yield loss when multiple pest infest a crop is thus highlighted.
Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Feature selection represents one of the critical processes in machine learning (ML). The fundamental aim of the problem of feature selection is to maintain performance accuracy while reducing the dimension of feature selection. Different approaches were created for classifying the datasets. In a range of optimization problems, swarming techniques produced better outcomes. At the same time, hybrid algorithms have gotten a lot of attention recently when it comes to solving optimization problems. As a result, this study provides a thorough assessment of the literature on feature selection problems using hybrid swarm algorithms that have been developed over time (2018-2021). Lastly, when compared with current feature selection procedu
... Show MoreStudied red beetle life on each of the yen and wheat durum wheat, barley, corn, rice, chickpeas, ground peanuts and beans in Living situation constant temperature and relative humidity of 65% for a period of 66 days was the life cycle of the insect different from one substance to another ....
The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreIn this work, the notion is defined by using and some properties of this set are studied also, and Ù€ set are two concepts that are defined by using ; many examples have been cited to indicate that the reverse of the propositions and remarks is not achieved. In addition, new application example of nano was studied.
Let M be ,-ring and X be ,M-module, Bresar and Vukman studied orthogonal
derivations on semiprime rings. Ashraf and Jamal defined the orthogonal derivations
on -rings M. This research defines and studies the concepts of orthogonal
derivation and orthogonal generalized derivations on ,M -Module X and introduces
the relation between the products of generalized derivations and orthogonality on
,M -module.
The concept of closed quasi principally injective acts over monoids is introduced ,which signifies a generalization for the quasi principally injective as well as for the closed quasi injective acts. Characterization of this concept is intended to show the behavior of a closed quasi principally injective property. At the same time, some properties of closed quasi principally injective acts are examined in terms of their endomorphism monoid. Also, the characterization of a closed self-principally injective monoid is given in terms of its annihilator. The relationship between the following concepts is also studied; closed quasi principally injective acts over monoids, Hopfian, co Hopfian, and directly finite property. Ultimately, based on
... Show MoreAbstract
These experiments seek to investigate the effects of the fixed variations to the basic box plot on subjects' judgments of the box lengths. The study consists of two experiments, were constructed as an extension to the experiments carried out previously by Hussin, M.M. (1989, 2006). Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box length and also varying with respect to other elements such as, box width or whisker length. When he (1989) suggested in the future research points (1, 2), the changing length of the st
... Show MoreIn our research, we introduced new concepts, namely *and **-light mappings, after we knew *and **-totally disconnected mappings through the use of -open sets.
Many examples, facts, relationships and results have been given to support our work.