Watermelon is known to be infested by multiple insect pests both simultaneously and in sequence. Interactions by pests have been shown to have positive or negative, additive or non additive, compensatory or over compensatory effects on yields. Hardly has this sort of relationship been defined for watermelon vis-à-vis insect herbivores. A 2-year, 2-season (4 trials) field experiments were laid in the Research Farm of Federal University Wukari, to investigate the interactive effects of key insect pests of watermelon on fruit yield of Watermelon in 2016 and 2017 using natural infestations. The relationship between the dominant insect pests and fruit yield were determined by correlation (r) and linear regression (simple and multiple) analyses. Multimodel inference was used to define the predictor that impacted on fruit yield the most. Results indicated that, each pest had highly negative and significant (p < 0.05) impact on yield (range of r = -0.78 to -0.92), and that the coefficient of determination (R2) values (which were indicative of the effect of pests or their complexes on yield) did not rise on addition of interaction terms. This reveals a non additive negative impact of insect interactions on the fruit yield of watermelon. This may be due to among others; competition by the pest, phenology, plant defenses or changes in nutritional content of the plant. The need to therefore employ discriminate analysis to ascertain the contribution of each pest to yield loss when multiple pest infest a crop is thus highlighted.
Collaborative learning in class‐based teaching presents a challenge for a tutor to ensure every group and individual student has the best learning experience. We present Group Tagging, a web application that supports reflection on collaborative, group‐based classroom activities. Group Tagging provides students with an opportunity to record important moments within the class‐based group work and enables reflection on and promotion of professional skills such as communication, collaboration and critical thinking. After class, students use the tagged clips to create short videos showcasing their group work activities, which can later be reviewed by the teacher. We report on a deployment of Group Tagging in an undergraduate Computing Scie
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThe unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:
- Apparent resistivity Rwa
- Rxo /Rt
The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu
... Show MoreWeb testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreNatural dye sensitized solar cell was prepared using strawberry and pomegranate dyes with anatase nanocrystalline titanium dioxide powder. A study of the optical properties of the two dyes, involving the absorption spectrum was determined in the visible region. I-V characteristics under illumination were performed. The results showed that the two prepared dye sensitized solar cells have acceptable values efficiency about (0.94 with Fill factor (45)) and (0.74 with Fill factor (44)) for strawberry and pomegranate dyes, respectively.
The aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).