When the guard honey bees, Apis mellifera L., form a clump at the hive entrance or on the flight board, the oriental hornet, Vespa orientails L., either creeps toward the clump or hovers over it in order to take a bee. Once the hornet creeps, only few bees facing the hornet become alert, rock their heads and antennae, open their wings, and take a posture of defense. The rest of the clump stays listless without any signal of concern. However, the clump stays dense and the defending bees do not detach themselves neither from the rest of the clump nor from each other. For this reason, it is very difficult for the hornet to grab a bee unless the latter makes a “mistake” by detaching herself from other adjacent bees. If the hornet grabs such a bee, the other defending bees will not attack the hornet to free that bee even when the latter is one centimeter from the others. The defending bees can capture the hornet only when the latter grabs one of them which stands very close to the others. The hornet seems very “aware” of such a situation; hence she seldom becomes a captive. On the other hand, hovering over the clump makes it easier for the hornet to grab a bee. The hovering puts all the clump, rather than part of it, on alert. If the hornet is persistent, which is not often the case, then the clump will no longer be dense. The bees will panicly disperse all over the flight board; hence the hornet can find a detached bee and grabs it easily. The hornet also waits on wing in front of the hive to capture an outgoing or incoming flying bee but the latter usually maneuver to escape. Also, foraging bees reduce their activity during main hours of hornet presence. Among the main factors reducing the hornet impact are the continuous chasing of hornets to each other and the non-persistent attempts of the hornets when they attack bee clumps.
In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a prior
... Show MoreLow incoming discharge upstream of Samarra-Al Tharthar System leads to sediment accumulation and forming islands, especially an island upstream of Al Tharthar Regulator. This island and the sedimentation threaten the stability of the structure and reduce the efficiency of the system. This study aims to hydraulically identify the sedimentation problem mentioned above, to find solutions of how to control the sediment problems, and to develop the capacity of
the system for 500 years return period flood of 15060 m3/s. Surface Water Modeling System (SMS10.1) with two dimensional depth average models (RMA-2) software were used to simulate and analyze the system. The results of analysis showed that the maximum permissible discharge through t
In this research, we present a nonparametric approach for the estimation of a copula density using different kernel density methods. Different functions were used: Gaussian, Gumbel, Clayton, and Frank copula, and through various simulation experiments we generated the standard bivariate normal distribution at samples sizes (50, 100, 250 and 500), in both high and low dependency. Different kernel methods were used to estimate the probability density function of the copula with marginal of this bivariate distribution: Mirror – Reflection (MR), Beta Kernel (BK) and transformation kernel (KD) method, then a comparison was carried out between the three methods with all the experiments using the integrated mean squared error. Furthermore, some
... Show MoreMagic is an attempt to affect people or events either by cheating and charlatanry means or by expecting devil powers in order to bring advantage or to avoid a harm or to bring harm to others or to for see the future and divition .
Magic is either real by the devil like writing majic works to prevent the marriage of someone and to depart the husband and his wife , causing someone to be distressed the physical and nervous diseases and stopping the stories and the project; majic can be artificial by being intellect and legerdemain and different types of triks and to cancel the magic by using magic or by protecting the self by using Talismans as well as presenting or offering sacrificers to the masters and th
... Show MoreThe metric dimension and dominating set are the concept of graph theory that can be developed in terms of the concept and its application in graph operations. One of some concepts in graph theory that combine these two concepts is resolving dominating number. In this paper, the definition of resolving dominating number is presented again as the term dominant metric dimension. The aims of this paper are to find the dominant metric dimension of some special graphs and corona product graphs of the connected graphs and , for some special graphs . The dominant metric dimension of is denoted by and the dominant metric dimension of corona product graph G and H is denoted by .
The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject shou
... Show MoreObjectives: To evaluate the families’ attitudes toward environment pollution, and determine the relationship
between families’ attitudes towards environment pollution and their demographic characteristics of age,
education, type of family, and socioeconomic status.
Methodology: A descriptive design is carried throughout the present study to evaluate families’ attitudes toward
environment pollution for the period of October 5th2013 to May 7th2014. A non-probability "purposive" sample of
(110) families’ is selected. The sample is comprised of two groups; (75) urban families’ and (35) rural ones. An
evaluation tool is designed and constructed for the purpose of the study. It is consisted of (4) main parts;
dem
Eminent figures in Quranic studies in the fourth century of the Hegira, in his
copacity as the founder of the essentials of the indicative approach in interpretation
which is based on the consideration of research principles in interpretation science.
Al-Qushayri participated in clarifying the promotions of this approach in his
works which represent this approach. The mast distinguished of these works is
Tafseer Lataef Al-Isharat. The researcher examined the characteristics of this
approach and its effect on the interpretative movement in Al-Qushayri age an come to
employ them as a practical example for the indicative approach in studying the
interpretation mebods in Islamic sciences.
During the prior three decades numerous research works presented to investigate the behavior of reinforced soil. A, IJSR, Call for Papers, Online Journal