This study was conducted to explore the effects of using ionized water on the productive and physiological performance of Japanese quails (Coturnix japonica). Our study was conducted at a private farm from 20th April, 2016 to 13th July, 2016 (84 d). One hundred 42-day-old Japanese quail chicks were used, divided randomly into 5 groups with 4 replicates. Treatments consisted in a control group (T1 - normal water:), alkaline (T2 - pH 8 and T3 - pH 9), and acidic water (T4 - pH 6 and T5 - pH 5). All birds were fed a balanced diet of energy and protein. The egg production ratio, egg weight, cumulative number of eggs, egg mass, feed conversion ratio, productivity per hen per week, and effects on plasma lipids, uric acid, glucose, calcium, and phosphorus were studied. The T3 group exhibited greater (P ≤ 0.05) average egg production, productivity per hen per week, cumulative number of eggs, and egg mass compared with the other groups. Moreover, all treated groups (T2 to T5) had higher (P ≤ 0.05) overall average egg weights compared with that of the T1 group. At 18 wk old, plasma cholesterol was decreased (P ≤ 0.05) in the T3 and T5 groups. Furthermore, more (P ≤ 0.05) high-density lipoprotein and less low-density lipoprotein were observed in all treated groups compared with the T1 control group. In conclusion, the productive and physiological performance of Japanese quail was improved in the T3 (alkaline water; pH 9) and T5 (acidic water; pH 5) groups compared with the other experimental groups.
Implementing smart community engagement should consider careful planning and collaboration with numerous stakeholders, including the community. The technology and program must be designed to frame its purpose and should link back to specific goals of implementing smart community engagement. Digital services do not guarantee a smart engagement between the community and the local government. This is the case for the Kubang Pasu local government where several online services have been provided in their attempt to implement the smart community concept. However, understanding on the preferences of features and requirements of existing web-based systems and the impact of these systems is lacking. Therefore, a perception study needs to be condu
... Show MoreThis experimental study focuses on scouring in box culvert inlets under steady-state conditions and at different percentages of blockage ranging from 0% to 65%, and also looks at the hydraulics of water in the culvert. The investigation shows that the blockage of the culverts has influenced the scouring pattern at the blocked culverts' entrances. Ten experiments were carried out at the laboratory to see how blockage impacts the scouring pattern upstream of a box culvert during steady flow. Both partially blocked and unblocked cases were implemented in this study. The experimental tests were done until the equilibrium scour occurred, which took about 3.5 hours of water flow to reach equilibrium conditions. The results r
... Show MoreThe protozoan parasite Entamoeba histolytica is a causative agent of amoebiasis, where it causes millions of cases of dysentery and liver abscess each year. Metronidazole is a drug of choice against amoebiasis. The drug is a choice because of its efficacy and low cost, but at the same time it causes several adverse side effects; therefore, it is important to find effective medications to treat amoebiasis without any complications or any side effects. The aim of this study is to evaluate the effectiveness of different concentrations (50, 75 and 100 µg/ml) of silver nanoparticle (AgNPs) against trophozoites stages of E. histolytica in vitro. The results showed a significant decrease (p ? 0.05) in numbers of trophozoites stages after treated
... Show MoreTwitter is becoming an increasingly popular platform used by financial analysts to monitor and forecast financial markets. In this paper we investigate the impact of the sentiments expressed in Twitter on the subsequent market movement, specifically the bitcoin exchange rate. This study is divided into two phases, the first phase is sentiment analysis, and the second phase is correlation and regression. We analyzed tweets associated with the Bitcoin in order to determine if the user’s sentiment contained within those tweets reflects the exchange rate of the currency. The sentiment of users over a 2-month period is classified as having a positive or negative sentiment of the digital currency using the proposed CNN-LSTM
... Show MoreBackground: Smoking is the major environmental risk factor that has been associated with the pathogenesis and progression of periodontal diseases. Interleukin-8 (IL-8), has been associated with the immunopathology of periodontitis. Objectives: To determine the influence of smoking on salivary Interleukin-8 level from smokers and non-smokers with periodontitis and periodontally healthy control subjects.
Materials and Methods: Un-stimulated saliva samples were collected of 90 participants: 30 smokers and 30 non-smokers with chronic periodontitis, as well as 30 periodontally healthy control subjects. The clinical parameters such as the pocket depth, clinical attachment loss, plaque index, and gingiv
... Show Moreسمير خلف فياض * و محسن طالب د.نوال عزت عبد اللطيف*, مجلة الهندسة والتكنولوجيا, 2010
Digital Elevation Model (DEM) is one of the developed techniques for relief representation. The definition of a DEM construction is the modeling technique of earth surface from existing data. DEM plays a role as one of the fundamental information requirement that has been generally utilized in GIS data structures. The main aim of this research is to present a methodology for assessing DEMs generation methods. The DEMs data will be extracted from open source data e.g. Google Earth. The tested data will be compared with data produced from formal institutions such as General Directorate of Surveying. The study area has been chosen in south of Iraq (Al-Gharraf / Dhi Qar governorate. The methods of DEMs creation are kriging, IDW (inver
... Show MoreTenofovir disoproxil fumarate, a nucleotide reverse transcriptase inhibitor utilized for the treatment of hepatitis B virus and human immunodeficiency virus infections; and is now one of the most widely used antiretroviral drug. However, tenofovir disoproxil fumarate can induce nephrotoxicity, which may be attributed to the interaction between such drug and the organic anion transporters (hOAT1, and OAT3) with consequent changes in levels of some parameters that may have a role in nephrotoxicity. Thiazide diuretics have high to intermediate potency of inhibition of OAT1s and OAT3; thus, it may possess nephroprotective effects. This study was designed to investigate whether hydrochlorthiazide has nephroprotective effects on tenofovir diso
... Show MoreIn this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A compari
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More