The study was conducted at the College of Agricultural Engineering Sciences - University of Baghdad in 2022. It aimed to improve the growth of the European black Henbane plant (
This study aimed to identify the employment of the social networking platform «Twitter» in the 2016 presidential campaign led by the Republican candidate, Donald Trump; and analyse his tweets through his personal account on «Twitter» for the period from: 10/ 8/2016 to: 11/ 8/2016 which represents the last month of the election campaign.
The study belongs to the type of descriptive studies using the analytical method through an analysis index that includes sub-categories and other secondary categories. The research has adopted the ordinary unit of information material (tweet) as an analysis unit for this purpose.
... Show MoreStevia rebaudiana Bertoni contains diterpenoid steviol glycosides that have no adverse impact on blood sugar levels despite being 300 times sweeter than sugar. This study aimed to investigate the rate of callus induction from stevia leaves and the content of glycosides when changing the sucrose percentage in the culture medium.. Murashige and Skoog (MS) culture medium supported by 4.0 mg/l naphthalene acetic acid (NAA) and 1.0 mg/l benzyl adenine (BA) was used, and different concentrations of sucrose (2, 3, 4, 5 and 6%) were tested .The extraction of glycosides from leaf and callus tissues was performed by using methanol. Extracted glycosides were analyzed by high-performance liquid chromatography (HPLC). The results showed signific
... Show MoreThe purpose of this research is to design a list of the scientific and moral values that should be found in the content of the computer textbook for the second intermediate grade, as well as to analyze the content of the above- mentioned book by answering the following question:
What is the percentage of availability of scientific and moral values in the content of the computer textbook for Second Intermediate grade issued by the Iraqi Ministry of Education / the general directorate of the curriculum, for the academic year (2017-2018)?
In order to achieve the research objectives, the descriptive method (content analysis method) was adopted. The research community has been iden
... Show MoreTraditional programs and the tedious and financially costly processes they require are no longer the best choice for content makers. The continuous development and development have led to the emergence of competitive software that offers capabilities that are more suitable for aesthetic needs, as it breaks down stereotypical frameworks from the familiar to the unfamiliar to be more suitable for graphic subjects in terms of dealing with the requirements of the digital content industry. Video for communication platforms, as it has more advantages than traditional software and the flexibility and high quality it offers at the level of the final product, All of this contributed to supplementing the image with aesthetic employments with data
... Show MoreConjugated Linoleic Acid (CLA) is an essential polyunsaturated omega fatty acid that occurs naturally in vegetable oils. It also plays an important role in preserving meat for longer periods by preventing oxidation of other fats. Thus, it can be used in the production of functional foods with high biological value and low cholesterol levels by adding poultry diets. Objective: The aim of the present study was to evaluate the effect of adding CLA to broiler diets on production performance and fatty acid content in the meat. Methodology: One-day-old Ross-308 chicks were randomly distributed into four dietary treatment groups: control (0 g CLA kgG1 diet; A1), 0.5 g CLA kgG1 diet (A2), 0.75 g CLA kgG1 diet (A3) and 1 g CLA kgG1 diet (A4). Diets
... Show MoreThe majority of the environmental outputs from gas refineries are oily wastewater. This research reveals a novel combination of response surface methodology and artificial neural network to optimize and model oil content concentration in the oily wastewater. Response surface methodology based on central composite design shows a highly significant linear model with P value <0.0001 and determination coefficient R2 equal to 0.747, R adjusted was 0.706, and R predicted 0.643. In addition from analysis of variance flow highly effective parameters from other and optimization results verification revealed minimum oily content with 8.5 ± 0.7 ppm when initial oil content 991 ppm, tempe
Abstract
This paper represents a study of the effect of the soil type, the drilling parameters and the drilling tool properties on the dynamic vibrational behavior of the drilling rig and its assessment in the drilling system. So first, an experimental drilling rig was designed and constructed to embrace the numerical work.
The experimental work included implementation of the drill-string in different types of soil with different properties according to the difference in the grains size, at different rotational speeds (RPM), and different weights on bit (WOB) (Thrust force), in a way that allows establishing the charts that correlate the vibration acceleration, the rate of penetration (ROP), and the power
... Show MoreTwo field experiments were conducted during the spring seasons of 2000,2001.The aim was to study the effect of hardening to drought tolerance on moisture percentage in root and stem of sunflower plant during growth stages . Asplit-split plots design was used with three replications.The main plots included irrigation treatments:irrigation to100%(full irrigation),75and50%of available soil water.The sub plots were the cultivars Euroflor and Flame.The sub-sub plots represented four seed soaking treatments :Control(unsoaked),soaking in water ,Paclobutrazol solution(250ppm),and Pix solution(500ppm). The soaking continued for 24 hours then seeds were dried at room temperature until they regained their original weight. Amount of water
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.