Due to the need for controlling and regulating of feed pellet. Pellet that is imported or locally manufactured is accompanied by cracking and crumbling percentage that occur during transporting and distributing to animals, using conveyors and mechanical feeders. This study aimed to determine the effect of particle size and die holes diameter in the machine on broiler feed pellets quality in pellet durability, pellet direct measurement, pellet expansion, and pellet length. Three particle size 2, 4, and 6 mm, and three diameters of die holes in the machine 3, 4, and 5 mm, have been used. The results showed that changing the particle size from 2 to 4 then to 6 mm led to a significant decrease in pellet durability and pellet lengths, pe
... Show MoreThe Covid-19 virus disease has been shown to affect numerous organs and systems including the liver. The study aimed to compare lipid profiles and liver enzyme levels in individuals who had recovered from Covid-19 infection. To achieve the study objectives, liver Aspartate Aminotransferase (AST), Alanine Aminotransferase (ALT), Alkaline phosphatase (ALP), Random Blood Sugar (RBS) and Lipid profile which include cholesterol, High-Density Lipoprotein (HDL), Triglycerides (T.G), Low-Density Lipoprotein (LDL), and Very low-density Lipoprotein (VLDL) were determined.
One hundred twenty serum samples were obtained, of which fifty samples were utilized as the control healthy persons (not affected by COVID) and seventy samples came f
... Show MoreThe education, especially higher education, is an essentially factor in the progress of any society, if we consider the higher education, represents the top of the education`s pyramid which take part in developing the human resources and provide the human staff to raise the productive efficiency, and improve the social , economic level
In order to face the increasing importance of higher education, great capabilities and expenditures must be available in a continous way, such expe
... Show MoreMixed Kirkuk and Sharki-Baghdad crude oils were distilled into narrow fractions. The range of these narrow fractions were 10oC, starting from IBP to 350oC. The total distillates from mixed Kirkuk and Sharki-Baghdad crude oils were 58.25 vol % and 44.65 vol %, respectively.The hydrocarbons compositions (paraffin, naphthene, aromatic) in light fractions starting from IBP to 250oC were determined by using PONA analysis method. The results show that the paraffin content decreases with increasing mid percent boiling point of the fraction, while the naphthene, and aromatic increase with the increase of mid percent boiling point of mixed Kirkuk and Sharki-Baghdad crude oils. Three groups of empirical equations were developed for the prediction
... Show MoreAbstract
This study identified the developing of a range of students' geography learning skills and the change in their attitudes toward fieldwork as a consequence of leaning experiences that occurred within a field trip. The sample of the study consisted of (27) students within a special topic course enrolled in Geography Department at Umm Al-Qura University in Saudi Arabia in semester 2, 2018. A range of students' geography learning skills were measured by the skills questionnaire that consisted of 12 geography skills after completing field work. Changes in students' at
... Show MoreObjective: This study aims to examine how implementing Extensible Business Reporting Language (XBRL) enhances the efficiency and quality of environmental audits and sustainability reporting in eco-friendly universities. Aligned with Sustainable Development Goal 12 (Responsible Consumption and Production), the study emphasizes promoting transparency and precision in sustainability reporting to encourage responsible management of resources within academic institutions. Theoretical Framework: The importance of our study is evident in the importance of accurate and transparent reports in the development of environmental performance with theories of sustainable reporting and environmental auditing. One of the most important digital
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More