The habitat type and food availability always influence the population size of many
organisms. Bird’s feeding pattern should be abstracted to complete avian community structure
data. The agronomy main research farm of Orissa University of Agriculture and Technology
is a well-managed multi-crop agro-ecosystem which provides a suitable ground for ecological
research. In a multi-crop farmland, the association of Barn Swallow Hirundo rustica Linnaeus,
1758, with the Indian mustard Brassica juncea (L.) Czernajew, 1859 crops have been
recorded for the first time while hovering only on this field. A flock of Barn swallows was
recorded in 32 field visits while flying continuously over the Indian mustard field after
flowering to ripening of fruit in the morning and sometimes in afternoon also. The range of
the birds was recorded from 6 to 61 with a mean individual of 36.03 ± 15.37 hovering for
1.83 hr daily. This may be the behaviour for the feeding pattern of these flying insectivorous
birds which was not seen in other crop-fields with same insect diversity describing it as not
the only reason for this behaviour. To reveal this poorly understood behaviour of flying
insectivore birds, a detailed long term behavioural study with gut content analysis is needed to
explain the particular reason behind this behaviour of Barn swallows which will support the
conservation of these birds and control their population decline.
The high cost of chemical analysis of water has necessitated various researches into finding alternative method of determining portable water quality. This paper is aimed at modelling the turbidity value as a water quality parameter. Mathematical models for turbidity removal were developed based on the relationships between water turbidity and other water criteria. Results showed that the turbidity of water is the cumulative effect of the individual parameters/factors affecting the system. A model equation for the evaluation and prediction of a clarifier’s performance was developed:
Model: T = T0(-1.36729 + 0.037101∙10λpH + 0.048928t + 0.00741387∙alk)
The developed model will aid the predictiv
... Show MoreThe detection of fungi contaminating maize grain and the effect of four plant extracts Azadirachta indica, Eucalyptus globulus Glycyrrhiza glabra and Zingiber officinale on the growth of A. flavus and its ability to produce AflatoxinB1. The results showed that the incidence of Aspergillus spp., was 52.75% of the isolated fungi, of which 29.50% was due to Aspergillus flavus, followed by Penicillium spp., with an incidence of 21.06%, and then Fusarium spp., with a rate of 18.13%. The percentage of toxin-producing A. flavus isolates reached 70.8% out of 24 isolates. The results showed the effect of alcoholic plant extracts at a concentration of 10 mg/ml on the fungal growth activity of A. flavus, the alcoholic extract of neem leaves was superi
... Show MoreThe present work deals with five species of parasitic Hymenoptera belonging to Pteromalidae, Eupelmidae and Eurytornidae which have been reared from brachid beetles. A new species, Eurytoma irakensis is described and the species, Bruchocida orientalis Crawford is recorded for the first time from Iraq.
In this effort, we define a new class of fractional analytic functions containing functional parameters in the open unit disk. By employing this class, we introduce two types of fractional operators, differential and integral. The fractional differential operator is considered to be in the sense of Ruscheweyh differential operator, while the fractional integral operator is in the sense of Noor integral. The boundedness and compactness in a complex Banach space are discussed. Other studies are illustrated in the sequel.
Central and Eastern European Online Library - CEE journals, documents, articles, periodicals, books available online for download, Zeitschrfitendatenbank, Online Zeitschriften, Online Zeitschriftendatenbank
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreDue to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically ra
... Show More
