Sex chromatin (SC) is defined as inactive X chromosome in the female somatic cells, it condensed as heterochromatic at interphase of the nucleus and appears like nuclear satellite projection, and only female cells contain SC in mammals. Different ages of cocks: immature (8,16 weeks old), growing (24 weeks old) and production age (32,48 weeks old) , were studied to detect the sex chromatin (SC) with it's various shapes :Sessile nodule(SS), Drum stick(DS), Tear drop(TD) and Club shape(CS) in the blood lymphocytes of blood smears prepared from WBCs of 45 New Hampshire(NH) strain cocks. Also SC measurements were detected which include: vertical (V) and horizontal (H) axes, SC area (SCA), nuclear area (NA), and the ratio(R) between these two areas. . Results show that SC is present in the male chicken blood lymphocytes in all ages. There is no significant difference in the incidence of the SC or its various measurements between ages, but the vertical axis was recorded a significant (P<0.05) decrease at 16 week old as compared with other ages. Also there is a non significant increase in the incidence of DS shape with ages; this indicated that simple, easy and cheap test could be helpful to detect some physiological parameters in the poultry species and other mammals.
In the present paper we report the synthesis of a new ligand [HL][(2-1-[(2-hydroxy-benzylidene)-hydrazono]-ethyl) benzene-1, 3, 5-triol and its complexes with (Mn", Fe", Cd", and Hg") The ligand was prepared in two steps. In the first step a solution of salicylaldehyed in methanol reacted under reflux with hydrazinemonohydrate to give an intermediate compound which reacted in the second step with 2, 4, 6-trihydroxidernonohydrate giving the tientioned ligand. The complexes were synthesis by direct reaction of the corresponding metal chloride with ligand. The ligand and the complexes have been characterized by spectroscopic methods [" H NMR, IR, UV-Vis,, atomic absorption], HPLC microanalysis along with conductivity measurements. From the abo
... Show MoreThere are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreIn this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N
... Show MoreMany patients with advanced type 2 diabetes mellitus (T2DM) and all patients with T1DM require insulin to keep blood glucose levels in the target range. The most common route of insulin administration is subcutaneous insulin injections. There are many ways to deliver insulin subcutaneously, such as vials and syringes, insulin pens, and insulin pumps. Though subcutaneous insulin delivery is the standard route of insulin administration, it is associated with injection pain, needle phobia, lipodystrophy, noncompliance, and peripheral hyperinsulinemia. Therefore, the need exists to deliver insulin in a minimally invasive or noninvasive way and in the most physiological way. Inhaled insulin was the first approved noninvasive and alternative way
... Show MoreThis work comprises the synthesis of new thioxanthone derivatives containing C-substituted thioxanthone. To obtain these derivatives, the o-mercapto benzoic acid was chosen as the starting material, which was reacted with dry benzene in sulfuric acid (98 %) to produce the thioxanthone (1). The 2,7-(disulfonyl phosphine imine) thioxanthone (4-8) were prepared from reaction of compound (1) with chlorosulfonic acid gave 2,7-(disulfonyl chloride) thioxanthone (2). Treatment of (2) with sodium azide to produce 2,7-(disulfonyl azide) thioxanthone (3). Condensation of (3) with phosphorus compounds afforded compounds (4-8). The 2,7-(disulfonamide) thioxanthone (9-21) was obtained when co
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThis work comprises the synthesis of new phenoxazine derivatives containing N-substituted phenoxazine starting from phenoxazine (1). Synthesis of ethyl acetate phenoxazine (2) through the reaction of phenoxazine with ethylchloroacetate, which reacted with hydrazine hydrate to give 10-aceto hydrazide phenoxazine (3), then reacted with formic acid to give 10-[N-formyl acetohydrazide] phenoxazine (4). Reaction of compound (4) with phosphorous pentaoxide or phosphorus pentasulphide to gave 10-[N-methylene-1,3,4-oxadiazole] phenoxazine (5) and 10-[N-methylene-1,3,4-thiadiazole] phenoxazine (6).
This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show More