In this study, functional and numerical response tests, which are important components in the selection of biological control agent, were carried out. In functional response trials, the amount of food consumed, attack rate (a) and handling time (Th) were calculated for each developmental period, depending on the number of preys given after 24 hours. The obtained results were evaluated with the Holling. In numerical response experiments, the development of the predator insect was examined depending on the number of preys given in certain numbers (5, 10, 20, 40 and 80) and the data were recorded. This phase of the trials continued until the individuals died. At this stage of the trials, the reproductive response of the predator on the aphid and the prey use efficiency were calculated. All of the productions and trials were carried out in climate rooms with a temperature of 27±1 °C, 65±5% RH. Experiments were carried out with 50 replications for each growth period and prey densities. According to the results obtained in the functional response trials, it was determined that the development periods with the highest productivity were the fourth larval and adult stages. When the results obtained from the numerical response experiments were evaluated, it was observed that the reproductive response increased with the increase of the prey given to H. variegata. Considering all the data obtained as a result of the study, it was concluded that H. variegata is effective on M. rosae and can be used in the control of this pest.
the regional and spatial dimension of development planning must be taken as a point of departure to the mutual of the spatial structure of the economy , development strategy and policies applied 'therein such as the location principles and regional development coordination of the territorial problems with the national development planning and timing of regional vis-a-vis national development plan_. Certain balance and integration is of sound necessity' between national _regional and local development objectives through which the national development strategy should have to represent the guidelines of the local development aspirations and goals. The economic development exerts an impact on the spatial evolution, being itself subje
... Show MoreIn the present paper, we have introduced some new definitions On D- compact topological group and D-L. compact topological group for the compactification in topological spaces and groups, we obtain some results related to D- compact topological group and D-L. compact topological group.
The concept of epiform modules is a dual of the notion of monoform modules. In this work we give some properties of this class of modules. Also, we give conditions under which every hollow (copolyform) module is epiform.
The aim of this research is to study some types of fibrewise fuzzy topological spaces. The six major goals are explored in this thesis. The very first goal, introduce and study the notions types of fibrewise topological spaces, namely fibrewise fuzzy j-topological spaces, Also, we introduce the concepts of fibrewise j-closed fuzzy topological spaces, fibrewise j-open fuzzy topological spaces, fibrewise locally sliceable fuzzy j-topological spaces and fibrewise locally sectionable fuzzy j-topological spaces. Furthermore, we state and prove several Theorems concerning these concepts, where j={δ,θ,α,p,s,b,β} The second goal is to introduce weak and strong forms of fibrewise fuzzy ω-topological spaces, namely the fibrewise fuz
... Show MoreIt is shown that if a subset of a topological space (χ, τ) is δ-semi.closed, then it is semi.closed. By use this fact, we introduce the concept regularity of a topological space (χ, τ) via δ-semi.open sets. Many properties and results were investigated and studied. In addition we study some maps that preserve the δ-semi.regularity of spaces.
The purpose of this paper is to introduce a new type of compact spaces, namely semi-p-compact spaces which are stronger than compact spaces; we give properties and characterizations of semi-p-compact spaces.
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
in this paper the notion of threshold relations by using resemblance relation are introduced to get a similarity relation from a resemnblance relation R