In this study, functional and numerical response tests, which are important components in the selection of biological control agent, were carried out. In functional response trials, the amount of food consumed, attack rate (a) and handling time (Th) were calculated for each developmental period, depending on the number of preys given after 24 hours. The obtained results were evaluated with the Holling. In numerical response experiments, the development of the predator insect was examined depending on the number of preys given in certain numbers (5, 10, 20, 40 and 80) and the data were recorded. This phase of the trials continued until the individuals died. At this stage of the trials, the reproductive response of the predator on the aphid and the prey use efficiency were calculated. All of the productions and trials were carried out in climate rooms with a temperature of 27±1 °C, 65±5% RH. Experiments were carried out with 50 replications for each growth period and prey densities. According to the results obtained in the functional response trials, it was determined that the development periods with the highest productivity were the fourth larval and adult stages. When the results obtained from the numerical response experiments were evaluated, it was observed that the reproductive response increased with the increase of the prey given to H. variegata. Considering all the data obtained as a result of the study, it was concluded that H. variegata is effective on M. rosae and can be used in the control of this pest.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreLet M is a Г-ring. In this paper the concept of orthogonal symmetric higher bi-derivations on semiprime Г-ring is presented and studied and the relations of two symmetric higher bi-derivations on Г-ring are introduced.
With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreIn the present work, the feasibility of formation near-ideal ohmic behavior of In/n-Si contact efficiently by 300 s duration Nd:YAG pulsed laser processing has been recognized. Several laser pulses energy densities have been used, and the optimal energy density that gives best results is obtained. Topography of the irradiated region was extensively discussed and supported with micrographic illustrations to determine the surface condition that can play the important role in the ohmic contact quality. I-V characteristics in the forward and reverse bias and barrier height measurements have been studied for different irradiated samples to determine the laser energy density that gives best ohmic behavior. Comparing the current results with
... Show MoreBackground: Oxidative stress may contribute to the etiology of hypertension in humans. Oxidative stress is an imbalance between reactive oxygen species (ROS) and antioxidant defense mechanisms, causing damage to biological macromolecules and dysregulation of normal metabolism and physiology. Amlodipine as an antihypertensive agent is a long-acting calcium channel blocker that dilates blood vessels and improves blood flow. The aim of this study was to assess the oxidative stress in hypertensive patients on Amlodipine treatment through the assessment of salivary Malondialdehyde (MDA) and superoxide dismutase (SOD) as a marker of oxidative stress.
Mat
... Show MoreFractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreIn this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show More