The experiment was conducted to investigate the predation behavior of crustacean
zooplankton M. albidus for first instar mosquito larvae of Culex quinquefasciatus, which may
be represented as an indicator of the species activity for biological control of mosquito larvae.
Results revealed that females spend 6.30 min. as average to find the mosquito larval and
to catch it, whereas it consumed 7.20 min. in digestion of the prey. On the other hand the
corresponding means for male were 10.29 and 4.00 min. respectively. Differences between
females and males were not significant for the time consumed to catch the prey whereas the
differences were significant (P < 0.05) in regard to the time consumed to digest the prey.
Results also revealed that the mean total time (catch and digest time) of females and males
were 13.55 and 14.29 min. respectively and the differences between them were not
significant.
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreAlongside the development of high-speed rail, rail flaw detection is of great importance to ensure railway safety, especially for improving the speed and load of the train. Several conventional inspection methods such as visual, acoustic, and electromagnetic inspection have been introduced in the past. However, these methods have several challenges in terms of detection speed and accuracy. Combined inspection methods have emerged as a promising approach to overcome these limitations. Nondestructive testing (NDT) techniques in conjunction with artificial intelligence approaches have tremendous potential and viability because it is highly possible to improve the detection accuracy which has been proven in various conventional nondestr
... Show MoreThe concept of epiform modules is a dual of the notion of monoform modules. In this work we give some properties of this class of modules. Also, we give conditions under which every hollow (copolyform) module is epiform.
The aim of this research is to study some types of fibrewise fuzzy topological spaces. The six major goals are explored in this thesis. The very first goal, introduce and study the notions types of fibrewise topological spaces, namely fibrewise fuzzy j-topological spaces, Also, we introduce the concepts of fibrewise j-closed fuzzy topological spaces, fibrewise j-open fuzzy topological spaces, fibrewise locally sliceable fuzzy j-topological spaces and fibrewise locally sectionable fuzzy j-topological spaces. Furthermore, we state and prove several Theorems concerning these concepts, where j={δ,θ,α,p,s,b,β} The second goal is to introduce weak and strong forms of fibrewise fuzzy ω-topological spaces, namely the fibrewise fuz
... Show More<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t
... Show MoreLet R be a commutative ring with identity, and W be a unital (left) R-module. In this paper we introduce and study the concept of a quasi-small prime modules as generalization of small prime modules.
The main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.
The main objective of controlling companies Concentration is to prevent their potential anti-competitive effects on the competitive structure of the relevant market, in order to protect freedom of competition in it. In this context, it is necessary to verify that these operations do not impede effective competition or reduce it significantly by making it less than it was before, it is necessary to Anticipate all the effects In order to achieve the goal of controlling on it and revealing their potential restrictive effects. So there must be Auditing Norms that enable the authorities entrusted with the protection of competition and the prevention of monopolistic practices to evaluate these effects and determine their positive and negative as
... Show MoreTo move forward on the path of goodness and peace, we must realize that, in the midst of the great diversity of cultures and forms of human life in the world, that we form one human nation, which God Almighty created to worship Him on His earth and under His heavens and to enjoy His bounties and natural resources that God Almighty has bestowed upon that nation. On one land, and it is governed by one common destiny. Every country has been endowed with a natural resource by God Almighty that distinguishes it from the other country to live in prosperity if these wealth are distributed equally among the members of the same society and societal justice is achieved. We must join together to work for the establishment of a sustainable global commu
... Show More