In this study, functional and numerical response tests, which are important components in the selection of biological control agent, were carried out. In functional response trials, the amount of food consumed, attack rate (a) and handling time (Th) were calculated for each developmental period, depending on the number of preys given after 24 hours. The obtained results were evaluated with the Holling. In numerical response experiments, the development of the predator insect was examined depending on the number of preys given in certain numbers (5, 10, 20, 40 and 80) and the data were recorded. This phase of the trials continued until the individuals died. At this stage of the trials, the reproductive response of the predator on the aphid and the prey use efficiency were calculated. All of the productions and trials were carried out in climate rooms with a temperature of 27±1 °C, 65±5% RH. Experiments were carried out with 50 replications for each growth period and prey densities. According to the results obtained in the functional response trials, it was determined that the development periods with the highest productivity were the fourth larval and adult stages. When the results obtained from the numerical response experiments were evaluated, it was observed that the reproductive response increased with the increase of the prey given to H. variegata. Considering all the data obtained as a result of the study, it was concluded that H. variegata is effective on M. rosae and can be used in the control of this pest.
In this paper, a new method of selection variables is presented to select some essential variables from large datasets. The new model is a modified version of the Elastic Net model. The modified Elastic Net variable selection model has been summarized in an algorithm. It is applied for Leukemia dataset that has 3051 variables (genes) and 72 samples. In reality, working with this kind of dataset is not accessible due to its large size. The modified model is compared to some standard variable selection methods. Perfect classification is achieved by applying the modified Elastic Net model because it has the best performance. All the calculations that have been done for this paper are in
Find cares studying ways in the development of industrial products and designs: the way the progressive development (how typical) and root development (jump design), was the aim of the research: to determine the effectiveness of the pattern and the jump in the development of designs and industrial products. After a process of analysis of a sample of research and two models of contemporary household electrical appliances, it was reached a set of findings and conclusions including:1-leaping designs changed a lot of entrenched perceptions of the user on how the product works and its use and the size and shape of the product, revealing him about the possibilities of sophisticated relationships with the product, while keeping the typical desi
... Show MoreIn his opus, Ted Hughes has annexed new and fresh territories of signification to the very notion of the literary animal. Building on the earlier modernist example of the Lawrencian legacy that dwells upon the question of animalism, Hughes seems to have stepped further into the terrain of the sheer struggle when, in his hands, the grotesquerie of survival and violence energizes the topos of the literary animal in his postmodern bestiary. In Hughes’s elemental poetic process this grotesquerie and violence stages the literary animal as a vital poetic device or motif that is finally restored to the primitive power of poetry. In his “Thrushes”, he thus defamiliarizes these tiny creatures’ acts of being to bring upfront into focus thi
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show MorePurpose: The research seeks to develop the implications of intellectual human capital, and social capital in business organizations, and will be accomplished on three levels, the first level (the level of description) to identify, diagnose and display content philosophical Strategic Human Resource Management at the thought of modern administrative represented by human capital and Ras social capital. The second level (level of analysis) and the analysis of the extent of the impact of alignment between human capital, and social capital in the organizational strength of the organizations. The third level (Level predict) the formulation of a plan to strengthen the organizational strength in business organizations and to develop speci
... Show MoreGeomechanical modelling and simulation are introduced to accurately determine the combined effects of hydrocarbon production and changes in rock properties due to geomechanical effects. The reservoir geomechanical model is concerned with stress-related issues and rock failure in compression, shear, and tension induced by reservoir pore pressure changes due to reservoir depletion. In this paper, a rock mechanical model is constructed in geomechanical mode, and reservoir geomechanics simulations are run for a carbonate gas reservoir. The study begins with assessment of the data, construction of 1D rock mechanical models along the well trajectory, the generation of a 3D mechanical earth model, and runni
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show More