Bigheaded carps (bighead carp, Hypophthalmichthys molitrix, and silver carp, Hypophthalmichthys nobilis) and their hybrids play an important ecological and economic role in their original habitat, while their introduced stocks may pose serious ecological risks. To address questions about the persistence and invasiveness of these fish, we need to better understand their population structures. The genetic structures of bigheaded carp populations inhabiting Lake Balaton and the Tisza River were examined with ten microsatellite markers and a mitochondrial DNA marker (COI). The Lake Balaton stock showed higher genetic diversity compared with the Tisza River stock. Based on hierarchical clustering, the Tisza population was characterized only by only silver carps, while the Balaton stock included hybrid and silver carp individuals. All COI haplotypes originated from the Yangtze River. Based on the high genomic and mitochondrial diversity, along with the significant deviation from H–W equilibrium and the lack of evidence of bottleneck effect, it can be assumed that bigheaded carps do not reproduce in Lake Balaton. The present stock in Balaton may have originated from repeated introductions and escapes from the surrounding fishponds. The Tisza stock consists solely of silver carp individuals. This stock appears to have significant reproductive potential and may become invasive if environmental factors change due to climate change.
This paper describes the digital chaotic signal with ship map design. The robust digital implementation eliminates the variation tolerance and electronics noise problems common in analog chaotic circuits. Generation of good non-repeatable and nonpredictable random sequences is of increasing importance in security applications. The use of 1-D chaotic signal to mask useful information and to mask it unrecognizable by the receiver is a field of research in full expansion. The piece-wise 1-D map such as ship map is used for this paper. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. Rec
... Show MoreThis study focuses on studying the effect of reinforced steel in detail, and steel reinforcement (tensile ratio, compression ratio, size, and joint angle shape) on the strength of reinforced concrete (compressive strength) Fc' and searching for the most accurate details of concrete divisions, their behavior, and corner resistance of reinforced concrete joint. The comparison of this paper with previous studies, especially in the studied properties. The conclusions of the chapter are summarized that these effects had a clear effect and a specific effect on the behavior and resistance of the reinforced concrete corner joints under the negative moments and under their influence and the resulting stress conditions. The types of defects that can
... Show MoreA Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreIn this paper, a FPGA model of intelligent traffic light system with power saving was built. The intelligent traffic light system consists of sensors placed on the side's ends of the intersection to sense the presence or absence of vehicles. This system reduces the waiting time when the traffic light is red, through the transition from traffic light state to the other state, when the first state spends a lot of time, because there are no more vehicles. The proposed system is built using VHDL, simulated using Xilinx ISE 9.2i package, and implemented using Spartan-3A XC3S700A FPGA kit. Implementation and Simulation behavioral model results show that the proposed intelligent traffic light system model satisfies the specified operational req
... Show More
Periodontal diseases are inflammatory diseases, for which, scaling and root planning is the main approach. Diode laser therapy as an adjunct to non-surgical periodontal treatment has shown some beneficial effects.
Aim: The objective of this single randomized controlled clinical study was to assess the effect of a 940 nm diode laser as an adjunct to SRP therapy in the treatment of periodontal pockets.
Methods: In this study, twenty patients in need of periodontal treatment with periodontal pocket ≥ 4 mm were selected for this split-mouth clinical study. Test group treated by diode laser 940 nm as an adjunct with SRP, control group treated by SRP in contralateral quadrants. Clinical
... Show MoreBubbled slabs can be exposed to damage or deterioration during its life. Therefore, the solution for strengthening must be provided. For the simulation of this case, the analysis of finite elements was carried out using ABAQUS 2017 software on six simply supported specimens, during which five are voided with 88 bubbles, and the other is solid. The slab specimens with symmetric boundary conditions were of dimensions 3200/570/150 mm. The solid slab and one bubbled slab are deemed references. Each of the other slabs was exposed to; (1) service charge, then unloaded (2) external prestressing and (3) loading to collapse under two line load. The external strengthening was applied using prestressed wire with four approaches, wh
... Show MoreIn recent years, there has been a significant increase in research demonstrating the new and diverse uses of non-thermal food processing technologies, including more efficient mixing and blending processes, faster energy and mass transfer, lower temperature and selective extraction, reduced thermal and concentration gradients, reduced equipment size, faster response to extraction control, faster start-up, increased production, and a reduction in the number of steps in preparation and processing. Applications of ultrasound technology have indicated that this technology has a promising and significant future in the food industry and preservation, and there is a wide scope for its use due to the higher purity of final products and the
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show More