The aim of this study was to improve the reproductive ability of native Iraqi chickens with the use of glycitein. The Studie was conducted on a of 120 Iraqi native chickens, consisting of 100 hens and 20 roosters. The chickens were 26 weeks old at the time of the study. The chickens were divided into four treatment groups, with each group consisting of 25 chicks. The experimental design consisted of four groups: the first group served as the non-injection control (referred to as T1), while the remaining groups (T2, T3, and T4) were treated with injections of glycitein at concentrations of 5, 10, and 15 mg/kg body weight, respectively. These injections were given subcutaneously in the
The effect of Wood Flour addition to the gamma alumina powder used in the preparation of gamma alumina (ɤ-Al2O3) catalyst carrier extrudates on the pore volume and BET surface area physical properties was investigated. Two parameters which are size of wood flour particles and its quantity were studied. The sizes of wood flour particles used are 150 µm, 212 µm and 500 µm and the weight percentage added to the gamma alumina powder during the preparation of the extrudates are (1%, 3%, 5% and 10%). The results showed that the addition of wood flour to the gamma alumina powder in order to get gamma alumina extrudates used as catalyst carrier is one of the successful methods to improve the pore volume
... Show MoreThe effect of 532nm Diode Pumped Solid State (DPSS) laser at power density of 5.234 W/cm2 on the growth of Gram-negative Pseudomonas aeruginosa and Gram-positive Staphylococcus aureus was evaluated. These bacteria were isolated from samples taken from burn and infected wound areas of 55 patients admitted to the burn-wound unit in Al-Kindy teaching hospital in Baghdad during the period from October 2012 to March 2013. Each isolate was identified using microscopic, cultural and biochemical methods. A standard bacterial suspension was prepared for each isolate. Serial dilutions were then prepared and a dilution of 10-5 was selected. Irradiation experiments included four groups: (L-P-) bacterial suspension in saline solution, (L-P+) bacteria
... Show MoreBackground: Although various imaging modalities are available for evaluating suspicious breast lesions, ultrasound-based Shear-Wave Elastography (SWE) is an advanced, non-invasive technique complementary to grayscale sonography. This technique evaluates the elasticity of a specific tissue by applying sonic pressure to that tissue.
Objective: The aim is to assess the role of SWE in evaluating solid breast masses in correlation to histopathological study results.
Subjects and Methods: This prospective study was done in a tertiary care teaching hospital from September 2019 to August 2020. A study population of 50 women aged 18 years or above with an
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More