Dates are considered one of the most important foods consumed in Arab countries. Dates are commonly infested with the sawtoothed grain beetle, Oryzaephilus surinamensis. Consequently, the date yield, quantity, and quality (economic value and seed viability) are negatively affected. This study was designed to investigate the effectiveness of air evacuation as eco-friendly and safe control method against adult O. surinamensis. Insects were obtained from the infested date purchased from a private store in sakaka city, Aljouf region, Saudi Arabia. Air evacuation (using a vacuum pump) and food deprivation were applied to O. surinamensis, and insect mortality was observed daily in comparison with the control group (administered both food and air). Application of both air evacuation, and food deprivation, significantly, increased the percentage of daily mortality when compared to control. Percentage accumulative mortality displayed very strong positive correlation with the time course in both cases of air-deprived and food-deprived groups. On the basis of lethal time values, the air evacuation method resulted in a comparable effect of food deprivation. Conclusively, the air-evacuation of the package is a very effective Eco-friendly and safe control method against O. surinamensis.
Praise to Allah, Lord of the Worlds. Thank you very much. Blessed. As his face should be majestic and great. His authority, and may peace and blessings be upon our master Muhammad, a perpetual blessing until the Day of Judgment
And upon the God of purity, His righteous companions, and those who follow them in righteousness until the Day of Judgment. But after:-
Anyone who looks into the history of nations, peoples, and the conditions of human beings will see that naturalization as a person’s affiliation to a particular state is something that happened only in recent centuries. In ancient times, a person’s loyalty was to the tribe to which the person belonged, and he was integrated into it and attributed to it, and in
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreTo ensure fault tolerance and distributed management, distributed protocols are employed as one of the major architectural concepts underlying the Internet. However, inefficiency, instability and fragility could be potentially overcome with the help of the novel networking architecture called software-defined networking (SDN). The main property of this architecture is the separation of the control and data planes. To reduce congestion and thus improve latency and throughput, there must be homogeneous distribution of the traffic load over the different network paths. This paper presents a smart flow steering agent (SFSA) for data flow routing based on current network conditions. To enhance throughput and minimize latency, the SFSA distrib
... Show MoreToxic substances have been released into water supplies in recent decades because of fast industrialization and population growth. Fenton electrochemical process has been addressed to treat wastewater which is very popular because of its high efficiency and straightforward design. One of the advanced oxidation processes (AOPs) is electro-Fenton (EF) process, and electrode material significantly affects its performance. Nickel foam was chosen as the source of electro-generated hydrogen peroxide (H2O2) due to its good characteristics. In the present study, the main goals were to explore the effects of operation parameters (FeSO4 concentration, current density, and electrolysis time) on the catalytic performance that was optimized by r
... Show MoreNumber theorists believe that primes play a central role in Number theory and that solving problems related to primes could lead to the resolution of many other unsolved conjectures, including the prime k-tuples conjecture. This paper aims to demonstrate the existence of this conjecture for admissible k-tuples in a positive proportion. The authors achieved this by refining the methods of “Goldston, Pintz and Yildirim” and “James Maynard” for studying bounded gaps between primes and prime k-tuples. These refinements enabled to overcome the previous limitations and restrictions and to show that for a positive proportion of admissible k-tuples, there is the existence of the prime k-tuples conjecture holding for each “k”. The sig
... Show MoreThis article conclude a theoretical study for the possibility to produce additional electric power from Iraqi steam power plants by cutting – off high-pressure feed water heaters . Three separated steam power plants which Dura , south –Baghdad and Nasria were studied . The investigation showed the possibity of increasing the electric power from 10 to 15% for Dura and Nasria , whereas 6% for south – Baghdad . According to the nowadays of operation to Iraqi steam power plants , the results showed that by cutting–off high pressure feed water heaters we can generate additional electric power about 250 MW during 3-4 hrs. daily. In addition, the fuel consumption can be reduced in comparison with diesel generat
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More