The habitat type and food availability always influence the population size of many
organisms. Bird’s feeding pattern should be abstracted to complete avian community structure
data. The agronomy main research farm of Orissa University of Agriculture and Technology
is a well-managed multi-crop agro-ecosystem which provides a suitable ground for ecological
research. In a multi-crop farmland, the association of Barn Swallow Hirundo rustica Linnaeus,
1758, with the Indian mustard Brassica juncea (L.) Czernajew, 1859 crops have been
recorded for the first time while hovering only on this field. A flock of Barn swallows was
recorded in 32 field visits while flying continuously over the Indian mustard field after
flowering to ripening of fruit in the morning and sometimes in afternoon also. The range of
the birds was recorded from 6 to 61 with a mean individual of 36.03 ± 15.37 hovering for
1.83 hr daily. This may be the behaviour for the feeding pattern of these flying insectivorous
birds which was not seen in other crop-fields with same insect diversity describing it as not
the only reason for this behaviour. To reveal this poorly understood behaviour of flying
insectivore birds, a detailed long term behavioural study with gut content analysis is needed to
explain the particular reason behind this behaviour of Barn swallows which will support the
conservation of these birds and control their population decline.
Background: The association between facial types and dental arches forms has considerable implications in orthodontic diagnosis and treatment planning. The aim was to establish the maxillary and mandibular dental arches width and length in skeletal and dental class II division 1 and class III malocclusion groups, find out the most frequent dental arch form and facial type and the association between them and to check the gender differences. Materials and Methods: Frontal and lateral facial photographs and maxillary and mandibular occlussal photographs for 90 iraqi subjects with age 18-25 years old (45 males and 45 females) divided equally into three groups, the 1st group with class II division 1malocclusion (overjet more than 3mm but less t
... Show MoreBlockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and
... Show MoreLarge amounts of plasma, the universe’s fourth most common kind of stuff, may be found across our galaxy and other galaxies. There are four types of matter in the cosmos, and plasma is the most common. By heating the compressed air or inert gases to create negatively and positively charged particles known as ions, electrically neutral particles in their natural state are formed. Many scientists are currently focusing their efforts on the development of artificial plasma and the possible advantages it may have for humankind in the near future. In the literature, there is a scarcity of information regarding plasma applications. It’s the goal of this page to describe particular methods for creating and using plasma, which may be us
... Show MoreNew ligand of N-(pyrimidin-2-yl carbamothioyl)acetamide was synthesized and its complexes with (VO(II), Mn (II), Cu (II), Zn (II), Cd (II) and Hg (II) are formed with confirmation of their structures on the bases of spectroscopic analyses. Antimicrobial activity of new complexes are studied against Gram positive S. aureus and Gram negative E. coli, Proteus, Pseudomonas. The octahedral geometrical structures are proved depending on the outcomes from the preceding procedures. Keywords: pyrimidin-2-amine, acetyl isothiocyanate, complexes, Antimicrobial activity
New ligand of N-(pyrimidin-2-yl carbamothioyl)acetamide was synthesized and its complexes with (VO(II), Mn (II), Cu (II), Zn (II), Cd (II) and Hg (II) are formed with confirmation of their structures on the bases of spectroscopic analyses. Antimicrobial activity of new complexes are studied against Gram positive S. aureus and Gram negative E. coli, Proteus, Pseudomonas. The octahedral geometrical structures are proved depending on the outcomes from the preceding procedures
The aim of this study is to develop a novel framework for managing risks in smart supply chains by enhancing business continuity and resilience against potential disruptions. This research addresses the growing uncertainty in supply chain environments, driven by both natural phenomena-such as pandemics and earthquakes—and human-induced events, including wars, political upheavals, and societal transformations. Recognizing that traditional risk management approaches are insufficient in such dynamic contexts, the study proposes an adaptive framework that integrates proactive and remedial measures for effective risk mitigation. A fuzzy risk matrix is employed to assess and analyze uncertainties, facilitating the identification of disr
... Show MoreThe key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.
The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreIn this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the
... Show More