Crocidolomia binotalis (Cb) (Zeller) is one of the main pests of cabbage which is difficult for farmers to control in the Ijen Crater in Indonesia. The demand for cabbage in Indonesia is increasing every year, so intensification efforts are continuously being made. Farmers intensively use synthetic pesticides as the primary control of Cb. The purpose of this study is to examine several control agents that can be used as an alternative to synthetic pesticides. Then, it provides recommendations to Ijen Crater farmers to adapt in reducing the use of synthetic pesticides. The biopesticide used was based on the Nuclear Polyhedrosis Virus strains of Spodoptera litura (SlNPV) and Helicoverpa armigera (HaNPV), botanical pesticides, and synthetic pesticides as a comparison treatment. SlNPv and HaNPV isolates were obtained from the Indonesian Sweetener and Fiber Crops Research Institute. The botanical pesticide formulas come from a combination of Azadiracta indica, Aglaia odorata, Ageratum conyzoides dried for one week and proposed to form flour. Then, it was extracted using 96% ethanol solvent, 0.5% tween 90 using a rotary evaporator at a temperature of 40oC. For synthetic pesticide, the treatment used the active ingredient Permethrin 20 mgL-1. The cb collected from the field was re-filtered in a Petri dish by providing artificial feed soaked with this material for 5 minutes. The highest mortality test results were found in the botanical pesticide formula with a value of 100% at 72 hours. Mortality in SlNPV and HaNPV tended to be stable with a maximum value of 72.02%. The results of mortality testing in the laboratory can be a recommendation for alternative control of Cb pests in cabbage plants in the field. In this case, it is an effort to reduce farmers' dependence on using synthetic pesticides.
The aim of the present investigation was to develop a microsponge delivery system of acyclovir to control its release when applied topically thereby reducing dosing frequency and enhancement patient compliance. The microsponges were produced by the oil in oil emulsion solvent diffusion method. The effect of different formulation and process variables such as internal phase volume, polymer type, drug-polymer ratio, stirring speed and stirring duration on microsponge production yield, loading efficiency, particle size and in-vitro drug release was evaluated. The result showed that the microsponge F2 prepared from Eudrajet RS polymer had optimum physical properties regarding the loading efficiency of 99.71_+ 0.7% and product
... Show MoreReceipt date:11/19/2020 acceptance date:10/1/2021 Publishing date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
Human rights are one of the basic concepts of modern and contemporary times, and political thought as the origin of political science and its source of knowledge have impact in this science and its branches
... Show MoreHuman health can be negatively impacted by exposure to loud noise, which can harm the auditory system. Traffic noise is the leading cause of noise pollution. This paper studies the problem of noise pollution on the roads in Baghdad, Iraq. Due to the increase in vehicle numbers and road network modifications in Baghdad, noise levels became a serious topic to be studied. The aim of the paper was thus to study traffic noise levels and the effect of the traffic stream on noise levels and to formulate a prediction model that identified the guidelines used for designing or developing future roads in the city. Then, the noise levels were measured based on five variables: the functional classification of roads, traffic flow, vehicle speed,
... Show MoreWhen embankment is constructed on very soft soil, special construction methods are adopted. One of the techniques is a piled embankment. Piled (stone columns) embankments provide an economic and effective solution to the problem of constructing embankments over soft soils. This method can reduce settlements, construction time and cost. Stone columns provide an effective improvement method for soft soils under light structures such as rail or road embankments. The present work investigates the behavior of the embankment models resting on soft soil reinforced with stone columns. Model tests were performed with different spacing distances between stone columns and two lengths to diameter ratios of the stone columns, in addition to different
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .