The herein research was carried out in order to identified the presence of bacteria in cervix and uterine lumen in Iraqi cattle during the different estrus phase with focusing on Protus and E coli. Estrus phases were determined by the structures which found on ovary (follicular growth for pro-estrus, mature growing follicle for estrus, hemorrhagic corpus luteam for meta-estrus and active corpus luteam for di-eatrus). Forty cervical swabs (ten for each estrus phase) and forty uterine swabs (ten for each estrus phase) were taken from macroscopically healthy reproductive animals after slaughtering and cultivated on nutrient agar and blood agar, the bacterial isolation were identified with biochemical teats. The present study found that (65%) of cervical swabs were bacterial positive and the bacterial isolates were higher in the pro-estrus and meta-estrus phases 70% than estrus and diestrus 60%, the Protus spp. Could not been isolated from cervix or uterine during estrus phases, while E coli isolated during three first phases and disappear during diestrus phase, and appear as 10 single and 10 mixed isolated during follicular phase and metaestrus phase in cervical swabs. A total of five different microorganisms were isolated from cervical swabs (Escherichia coli, Streptococcus faecalis, Staphylococcus aureus, Staphylococcus hominies and Staphylococcus epidermidis) with twelve single isolation and fourteen mixed isolation. The present study found that (47.5%) of uterine swabs were bacterial positive and the bacterial isolates were higher in the pro-estrus, estrus and meta-estrus phases 50% than estrus and diestrus 40%, E coli isolated during estrus and diestrus phases only, and appear as 7 single and 2 mixed isolated during those two phases in uterine swabs. A total of five different microorganisms were isolated from uterine swabs (Escherichia coli, Streptococcus faecalis, Staphylococcus aureus, Staphylococcus hominies and Staphylococcus epidermidis) with fourteen single isolation and five mixed isolation.
The study aimed to prepare quick response codes to learn some of the technical skills of the second graders in the Faculty of Physical Education and Sports Sciences. The experimental method was used in the design of the experimental and control experimental and control groups. The research sample was represented by second-graders in the College of Physical Education and Sports Sciences / University of Baghdad, and by lot, the second division (a) was chosen to represent the experimental group that applied the inverse method using the QR code, and the second division (g) to represent the control group and applied the traditional method. (10) Students per group. After the tribal tests, his main experiment was carried out for 10 weeks with one
... Show MoreAbstract
The aim of this study was to identify the impact of the Knowledge Management Processes on organizational creativity in the Airlines Companies working in Sudan. The hypotheses formulated as:, there is a positive relationship statistically significant differences between knowledge management processes (diagnosis, the acquisition, storage, distribution and application) and organizational creativity. the measurement of the variables had been adopted from previous studies. The study used a Descriptive approach and and the analytical statistical method to construct the model and SPSS Program for data analysis .Purposive sample procedure had been chosen and structured questionnaire had been developed. Out of 215 q
... Show MoreNot necessarily to be malnutrition is a result of poverty and lack of food, it may be the outcome of the wrong food practices; and the lack of knowledge in nutrition basis and chronic diseases. Some studies have confirmed that the more the knowledge in nutrition basis increased, the more the child has well-balanced food.
Unhealthy eating habits spread among children at an early age, which is one of the negative factors affecting the nutritional status they have causing various disorders as a result of lack or increase of food or lack of balance. The signs and symptoms of these disorders can be simple or can lead to deadly diseases.
Training children on proper eating habits in different fields of life is considered the mos
... Show More
Statistical control charts are widely used in industry for process and measurement control . in this paper we study the use of markov chain approach in calculating the average run length (ARL) of cumulative sum (Cusum) control chart for defect the shifts in the mean of process , and exponentially weighted moving average (EWMA) control charts for defect the shifts for process mean and , the standard deviation . Also ,we used the EWMA charts based on the logarithm of the sample variance for monitoring a process standard deviation when the observations (products are selected from al_mamun factory ) are identically and independently distributed (iid) from normal distribution in continuous manufacturing .
The aim of this work is study the partical distribution function g(r12,r1) for Carbon ion cases (C+2,C+3,C+4) in the position space using Hartree-Fock's Wave function, and the partitioning technique for each shell which is represented by Carbon Ions [C+2 (1s22s2)], [C+3 (1s22s)] and [C+4 (1s2)]. A comparision has been made among the three Carbon ions for each shell. A computer programs (MATHCAD ver. 2001i) has been used texcute the results.
The State company for vegetable oils industry one of the most dynamic
companies in the Iraqi economy and is one of the companies manufacturing(food) that takes astrategic dimension and production within the concept of food security, this as well as to reduce dependence on imports and operation of national manpower.This study aims to describe the performance of the State company for vegetable oils industry for the period (2003-2007) which was characterized by economic and security instability of the country and give an accurate picture of their efficiency and their capacity to produce during this Period.
Abstract search seeks to clarify the role and the importance of financial and fiscal policy adopted by the Iraqi Government during the years (2015 – 2018) to meet federal public deficit, as the Iraqi economy to shocks from falling global oil prices and terrorist attack ISIS, so the State budget suffered from a severe lack of income as a result of its reliance on revenues from selling crude oil and in return the high proportion of public expenditures. Especially military to counter these attacks that by studying the results of the implementation of budgets and analysis and statement Causes of disabilities and assessment of these policies and procedures imposed by the International Monetary Fund. the research aims to show how increased g
... Show MorePublic-private partnership (PPP) has been used over the past 20-30 years by governments in developed countries to meet the public demand for infrastructural services. In Iraq, the PPP concept is comparatively new to the Government of Iraq (GoI), where the government has historically taken most of the responsibility for providing public services. There are few PPP projects in Iraq. However, the number is increasing. Recently the Iraqi market has experienced a number of attempts of PPP in different sectors, especially after the new investment law in 2006. The aim of this paper is to evaluate the investment environment in Iraq and to indicate the main factors affecting PPP in particular for infrastructure projects. Some literature review and
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More