The experiment was carried out the study of effect of seed peels of Nigella sativa and Brassica nigra by 5, 10 mg/ kg soil that added them to soil alone and 5, 10 mg/kg soil together on the growth of Cicer arietinum plants. The results showed the increased significantly germination accelerator, plant height, leaves number, branches number, flowers number, legumes number, seed dry mater, carbohydrate and protein percentage in seeds.
An experimental study is carried out on the effect of vortex generators (Circular and square) on the flow and heat transfer at variable locations at (X = 0.5, 1.5, 2.5 cm) ahead of a heat exchanger with Reynolds number ranging from 62000< Re < 125000 and heat flux from 3000 ≤ q ≤ 8000 W/m2 .
In the experimental investigation, an apparatus is set up to measure the velocity and temperatures around the heat exchanger.
The results show that there is an effect for using vortex generators on heat transfer. Also, heat transfer depends on the shape and location. The circular is found t
... Show MoreBackground: Herbal medicine can be called one of the branches of medicine in various forms. Turmericcurcumin has proved its efficiencies a coloring, flavoring agent and has been traditionally used in medicine, exhibiting remarkable anti-inflammatory and antioxidant properties. The varied biological properties of curcumin and lack of toxicity even when administered at higher doses makes it attractive to explore its use in various disorders like diseases of skin. It is good potential agent for wound healing. Materials and methods: Sixty four new Zealand rabbits were used in this study ,they were divided into four groups,each group was subdivided as follows:Experimental groups(8 rabbits) right facial side of animals for essential oil applicati
... Show MorePurpose: To determine the impact of service encounter in stimulating voluntary customer behaviors.
- Approach / methodology: It was selected a sample of customers Bank Iraqi Trade (TBI) was (105) individual, using a questionnaire designed in the light of previous studies, was drafted scale and tested in the light of a group of statistical methods developed (reliability coefficient, reliability coefficient composite, convergence). Then test hypotheses through structural equation modeling.
- Results: The behaviors and characteristics of the service provider in effect urged bank customers to perform voluntary extra, as the service environment service encounter
This paper presents an experimental and numerical study which was carried out to examine the influence of the size and the layout of the web openings on the load carrying capacity and the serviceability of reinforced concrete deep beams. Five full-scale simply supported reinforced concrete deep beams with two large web openings created in shear regions were tested up to failure. The shear span to overall depth ratio was (1.1). Square openings were located symmetrically relative to the midspan section either at the midpoint or at the interior boundaries of the shear span. Two different side dimensions for the square openings were considered, mainly, (200) mm and (230) mm. The strength results proved that the shear capacity of the dee
... Show MoreBackground: study the effect of various risk factors on reperfusion success after thrombolysis by measuring ST resolution.
Objectives: Early patency of the infarct-related artery is associated with reduced mortality. Thrombolytic therapy is frequently followed by rapid recanalization lead to reduction of infarct size, improve left ventricular function and increase survival by reopening of coronary artery . The reduction in ST-segment elevation on the standard 12 lead electrocardiogram 1-4 h after initiation of thrombolysis may be the simplest and most useful clinical tool to test the effectiveness of thrombolytic therapy.
Methods: Seventy patients with acute ST elevation myocardial infarction admitted to alkindy teaching hospital C
Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More