The study aims to identify the third instar larvae of fly species (Order : Diptera) feeding on carcasses (Fishes and Rabbits). Two families (Calliphoridae and Sarcophagidae), were recorded with highest rate in Calliphoridae species. The following species had been registered in accordance with their prevalence respectively; Calliphora vicina Rob.-Desvoidy, Chrysomya albiceps (Wiedmann), Chrysomy megacephala (Fabricius), Sarcophaga sp. and Lucilia sericata (Meigen). The highest rate has been registered Calliphora vicina during February, November, December and January at rate 100%, the larvae of this fly have not been observed during July, August, September and October. The highest rate of Chrysomya albiceps during October, whereas it didn’t appear during February, March, July, November, December and January. As for the appearance of Ch. megacephala, was highest registered during July, but there was no incidence of its appearance during February, March, April, November, December and January. Sarcophaga sp. had been registered at high rate in summer, the highest rate in August, but there was no observation during cold month. Third instar larvae of Lucilia sericata were registered in lowest rate compared with other species, was highest rate in March, whereas have not been registered during February, May, July, August, September, October, November, December and January. This study was concluded the total number of the larvae of these species collected on carcasses was less in Months of Summer compared than other Months.
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreThe synthesis and bioactivity of zinc oxide nanoparticles has been extensively studied. The antibacterial activity of different antibiotics individually (ceftriaxone (C), chloramphenicol (CRO), penicillin (P) and amoxicillin (Ax)) and Zinc oxide nanoparticles (60μg/ml) in combination with the previously mentioned antibiotics has been demonstrated in the present study by using the disk diffusion assay method. The results showed a synergistic effect between Zinc oxide nanoparticles (ZnO NPs) and both Ax and P for most of the studied Gram-positive isolates (Staphylococcus aureus1, Staphylococcus aureus2, Staphylococcus epidermidis1, Staphylococcus epidermidis2, Enterococcus faecalis1, Enterococcus faecalis2 ) and between ZnO NPs and both C
... Show MoreThe reason for conducting this study is to prolong release of miconazole in the ocular site of action by ocular-based gels (OBGs) formulations. The formulation factors affecting on the release from OBG should be studied using various gelling agents in various concentrations to achieve the improvement in retention and residence time in response to prolonged release. In this study, the formulations were prepared using carbopol 940, pectin, sodium alginate, poloxamer 407, and poly(methacrylic acid) at 0.5%, 1%, and 1.5% w/v, respectively. Hydroxypropyl methylcellulose E5 (HPMC E5) 1% was added as thickening agent/viscosity builder. The formulation containing carbopol 940, pectin and sodium alginate at 1.5% w/v, displayed a noticable im
... Show MoreThis in order to test the effect of food on growth and fecundity, two kinds of food have been used the algae Scendesmus quadricaudae and fresh water shrimp powder. For two generations, growth and productivity have been followed up. The fresh water shrimp has been noticed as a food better than algae, because it caused recording, for the two generation higher length rate for the weeks of experiment. The individuals length rate at the end of the forth week reached 9.35 and 9.48 mm for the first generation and second generation respectively. The average length weekly increase rate for the first and second generations individuals feeding on dried shrimp was higher through the first and second week compared to what was recorded when feeding alga
... Show MoreAkaike’s Information Criterion (AIC) is a popular method for estimation the number of sources impinging on an array of sensors, which is a problem of great interest in several applications. The performance of AIC degrades under low Signal-to-Noise Ratio (SNR). This paper is concerned with the development and application of quadrature mirror filters (QMF) for improving the performance of AIC. A new system is proposed to estimate the number of sources by applying AIC to the outputs of filter bank consisting quadrature mirror filters (QMF). The proposed system can estimate the number of sources under low signal-to-noise ratio (SNR).
Anatomical changes in internal tissue of stem and leaf when seed and plant treated with acids to enhance growth and development in maize was studied during the spring seasons of 2019 and 2020. Randomized complete block design was used with three replications. Main plots received foliar nutrition treatments, including ascorbic acid (AA), citric acid (CA), and humic acid (HA) at concentrations of 100 mg L−1, alongside HA at 1 ml L−1, with distilled water as the control. Sub-plots underwent corresponding treatments for seed soaking. Results indicated variations in vascular bundle size among treatments, with foliar CA treatment showing superior results in both years, as well as seed soaking in CA and HA. Interaction effects were observed, n
... Show MoreLet R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative
Image compression is a serious issue in computer storage and transmission, that simply makes efficient use of redundancy embedded within an image itself; in addition, it may exploit human vision or perception limitations to reduce the imperceivable information Polynomial coding is a modern image compression technique based on modelling concept to remove the spatial redundancy embedded within the image effectively that composed of two parts, the mathematical model and the residual. In this paper, two stages proposed technqies adopted, that starts by utilizing the lossy predictor model along with multiresolution base and thresholding techniques corresponding to first stage. Latter by incorporating the near lossless com
... Show More