In this study, functional and numerical response tests, which are important components in the selection of biological control agent, were carried out. In functional response trials, the amount of food consumed, attack rate (a) and handling time (Th) were calculated for each developmental period, depending on the number of preys given after 24 hours. The obtained results were evaluated with the Holling. In numerical response experiments, the development of the predator insect was examined depending on the number of preys given in certain numbers (5, 10, 20, 40 and 80) and the data were recorded. This phase of the trials continued until the individuals died. At this stage of the trials, the reproductive response of the predator on the aphid and the prey use efficiency were calculated. All of the productions and trials were carried out in climate rooms with a temperature of 27±1 °C, 65±5% RH. Experiments were carried out with 50 replications for each growth period and prey densities. According to the results obtained in the functional response trials, it was determined that the development periods with the highest productivity were the fourth larval and adult stages. When the results obtained from the numerical response experiments were evaluated, it was observed that the reproductive response increased with the increase of the prey given to H. variegata. Considering all the data obtained as a result of the study, it was concluded that H. variegata is effective on M. rosae and can be used in the control of this pest.
The holmium plasma induced by a 1064-nmQ-switched Nd:YAG laser in air was investigated. This work was done theoretically and experimentally. Cowan code was used to get the emission spectra for different transition of the holmium target. In the experimental work, the evolution of the plasma was studied by acquiring spectral images at different laser pulse energies (600,650,700, 750, and 800 mJ). The repetition rates of (1Hz and 10Hz) in the UV region (200-400 nm). The results indicate that, the emission line intensities increase with increasing of the laser pulse energy and repetition rate. The strongest emission spectra appeared when the laser pulse energy is 800mJ and 10 Hz repetition rate at λ= 345.64nm, with the maximum intensi
... Show MoreTwo means used for saving fish samples, namely Freezing and Preservatives represented by Alcohol and Formalin. The Freezing was used in saving samples collected newly, in addition to use Alcohol and Formalin with different concentrations 70% of Alcohol and 10% of Formalin. The concentrations of some heavy metal elements were examined, such as Potassium, Phosphorus, Calcium, Manganese, Magnesium, Zinc, Iron, Copper and Boron in samples saved in Formalin and Alcohol and frozen at different durations. The concentration of some elements has been changed during the saving duration. The study was performed on the concentration of heavy elements in the Liza abu muscles of saved and frozen fish.
Continuous conflict between Parisian and Ottoman states the results that Iraq became as
aground for their battles which leads to their own interests in Iraq which are shape their
strategy. The conflict continues for long time. In spite of, they signed many treatments and
protocols between the two sides, as Arzarom treaty , the first and the second, Tahran protocols
, and Astana protocol. This conflict, no sides of them to dose any part of their land, but these
treaties leaded to a big loss to Iraq ,which lost parts of it's land and water area in Ahwaz and
shatt AL-Arab, so, Iraq became as a smoth target for their interests, and lost its
sovereignty,and lost self-govern of the country country . so the research conclud
In this paper, we define a cubic bipolar subalgebra, $BCK$-ideal and $Q$-ideal of a $Q$-algebra, and obtain some of their properties and give some examples. Also we define a cubic bipolar fuzzy point, cubic bipolar fuzzy topology, cubic bipolar fuzzy base and for each concept obtained some of its properties.
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreIn this paper, CdO nanoparticles prepared by pulsed laser deposition techniqueonto a porous silicon (PS) surface prepared by electrochemical etching of p-type silicon wafer with resistivity (1.5-4Ω.cm) in hydrofluoric (HF) acid of 20% concentration. Current density (15 mA/cm2) and etching times (20min). The films were characterized by the measurement of AFM, FTIR spectroscopy and electrical properties.
Atomic Force microscopy confirms the nanometric size.Chemical components during the electrochemical etching show on surface of PSchanges take place in the spectrum of CdO deposited PS when compared to as-anodized PS.
The electrical properties of prepared PS; namely current density-voltage charact
... Show MoreBackground: Chronic periodontitis is an inflammatory disease of tissues supporting the teeth. Salivary compositions have been most intensely studied as a potential marker for periodontal disease. In this study, analysis of saliva provides a simple and non-invasive method of evaluating the role of salivary IgA (s-IgA) levels in periodontal disease by detecting the level of (s-IgA) in patients with chronic periodontitis smokers and non smokers patients and correlate the mean (s-IgA) levels with clinical periodontal parameters Plaque index (PLI) gingival index (GI), probing pocket depth (PPD) and clinical attachment level (CAL). Materials and Methods: The study samples consists of (15) patients with chronic periodontitis who were non smokers (
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show More