A square experimental arena with vegetation on one interior side was deployed in a Sharjah, United Arab Emirates desert. Individual darkling beetles (Coleoptera, Tenebrionidae) Akis subtricostata Redtenbacher, 1850 and Trachyderma philistina Reiche and Saulcy, 1857 were placed inside the arena at temperatures ranging between 27 - 49°C. Whether they chose the vegetated side of the arena or not was recorded, as well as how long it took for them to reach the vegetated side, if they chose it. Both species preferred the vegetated side at all temperatures, and the chance of them choosing the vegetated side increased significantly with increasing temperature (logistic regression, p = 0.0096 and p = 0.0003 for T. philistina and A. subtricostata, respectively). T.philistina and A. subtricostata always chose the vegetated side at temperatures above 31°and 44°C, respectively. Individual beetles that chose the vegetated side moved quickly and directly to it at temperatures above 30°C. Below 30°C, however, beetles tended to move slower and take more pauses within the arena. Time to reach the vegetated side declined significantly with increasing temperature (least-squares regression, p < 0.00005 for both species). A few individuals of both species died at the highest temperatures (48 - 49°C).
Porosity is important because it reflects the presence of oil reserves. Hence, the number of underground reserves and a direct influence on the essential petrophysical parameters, such as permeability and saturation, are related to connected pores. Also, the selection of perforation interval and recommended drilling additional infill wells. For the estimation two distinct methods are used to obtain the results: the first method is based on conventional equations that utilize porosity logs. In contrast, the second approach relies on statistical methods based on making matrices dependent on rock and fluid composition and solving the equations (matrices) instantaneously. In which records have entered as equations, and the matrix is sol
... Show MoreVehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that c
... Show MoreThis study aims to analyze the spatial distribution of the epidemic spread and the role of the physical, social, and economic characteristics in this spreading. A geographically weighted regression (GWR) model was built within a GIS environment using infection data monitored by the Iraqi Ministry of Health records for 10 months from March to December 2020. The factors adopted in this model are the size of urban interaction areas and human gatherings, movement level and accessibility, and the volume of public services and facilities that attract people. The results show that it would be possible to deal with each administrative unit in proportion to its circumstances in light of the factors that appe
'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal
In this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet func
In this research the results of applying Artificial Neural Networks with modified activation function to perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of identification strategy consists of a feed-forward neural network with a modified activation function that operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have been trained online and offline have been used, without requiring any previous knowledge about the system to be identified. The activation function that is used in the hidden layer in FFNN is a modified version of the wavelet function. This approach ha
... Show MoreTanuma and Zubair formations are known as the most problematic intervals in Zubair Oilfield, and they cause wellbore instability due to possible shale-fluid interaction. It causes a vast loss of time dealing with various downhole problems (e.g., stuck pipe) which leads to an increase in overall well cost for the consequences (e.g., fishing and sidetrack). This paper aims to test shale samples with various laboratory tests for shale evaluation and drilling muds development. Shale's physical properties are described by using a stereomicroscope and the structures are observed with Scanning Electron Microscope. The shale reactivity and behavior are analyzed by using the cation exchange capacity testing and the capillary suction test is
... Show MoreThis research was one of the terms that used by Al-Bazzar in his musnad and this term was (Al-azza) who launched on some ways and hadiths and I collected those narration, and I have graduated and studied it to access to the meaning which Al-Bazzar want that from this description. In the introduction of the research, I have mention the importance of the subject and the reasons for his selection and also my plan, a preface where I mentioned the definition of Al-Bazzar and his musnad, then in the first section I defined Al-azza linguistically and idiomatically , the second section I studied the hadiths that Al-Bazzar described them with azza ,and then I conclude it with my results that I have reach
... Show More