ZG Abdulrazaq, MR Younus, Nasaq, 2023
This study aimed to assess the possible association of oxytocin (OXT) gene with reproductive traits in two groups of Awassi ewes that differ in their reproductive potentials. Sheep were genotyped using PCR—single-stranded conformation polymorphism approach. Three genotypes were detected in exon 2, CC, CA, and AA, and a novel SNP was identified with a missense effect on oxytocin (c.188C > A → p.Arg55Leu). A significant (p < 0.01) association of p.Arg55Leu with the twinning rate was found as ewes with AA and CA genotypes exhibited, respectively a lower twinning ratio than those with the wild-type CC genotype. The deleterious impact of p.Arg55Leu was demonstrated by all in silico tools that were utilized to assess the effect of this varian
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
The aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More