The numerical response of Chrysoperla mutata MacLachlan was achieved by exposing the larvae of the predators to various densities of dubas nymphs Ommatissus lybicus DeBerg. Survival rate of predators’ larvae and adults emergence increased with increasing consumption . Repriductive response of predator was highly correlated with the amount of food consumed (+0.996).
Success in selecting the best among the sources of supply is one of the most important factors in the efficiency of the procurement activity in the company, because the proper selection of the source of the supply significantly affect the achievement of what is desired by the factors of quality, quantity, price and service, and the ability of the competent supplier to meet everything associated with this Factors of commitments, hereby supporting the procurement function's efforts to fully discharge its responsibilities, and in view of adopting of Al-Furat company quality management system by applying the standards of ISO (9001: 2015) and purpose of getting the on-demand benefits from the application of international standards reg
... Show Moreבמחקר הזה ניתחנו מספר נאומים של שמעון פרס, אנחנו התמקדנו בהשפעה והשכנוע אצל שמעון פרס ואיך הוא יכול להעביר את המסרים של נאומיו בסגנון פרגמטי כדי להגיע ללבו של הציבור.
גם כן, התמקדנו בסגנון הפוליטי שהוא חושב כי התחום הזה צריך להיות ברור מול הציבור וגם כן מול דעת הקהל הבינלאומי מתוך השימוש במונחים בעלי השפעה ושכנוע להגיע למטרות המבוקשות.
במלים אחרות, שמעון פרס, לעתים, מתמקד בשפה מליצית ויעמוד הרב
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreImage fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show MoreIn this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.
Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More