This study concluded detection of Toxoplasma gondii in milk, immunologically by using Elisa and nested PCR)nPCR (based on B1 gene, also to investigate the effect of toxoplasmosis, parity, breed and flock on some milk composition in the Iraqi local and Shami goats in the middle of Iraq. A total of 80 milk samples of the lactating goats were collected. Results of this study showed the prevalence of Toxoplasmosis was 21.25% and 28.75% by Elisa and nPCR respectively without significant differences. The sensitivity of Elisa was a low (30.43%) whereas the specificity was a high (82.45%). The degree of agreement estimated by Kappa coefficient revealed a slight agreement (0.14) between two methods. The results indicated that goats infected with toxoplasmosis have significantly (P<0.05) higher in protein and lactose percentage whereas the effect was not significant for each of fat, SNF and pH. On the other hand, the effect of parity was significant (P<0.05) on fat, protein, lactose, solid nonfat and non-effect on PH. As well as effect of breed and flock was significant (P<0.05) on protein, lactose and solid nonfat without significant effect on fat and PH.
Context has occupied a distinguished place as far as the understanding of the texts and deducting the rules from them or analyzing them. The context was considered as one of the important presumptions as far arriving at the desired meanings is concerned. The word is worthless and the meaning is not known unless we know the context in which it came. The context in its two types the lingual and non-lingual types. It is the best for knowing the intended meaning of the Quranic verses to know the real meaning.
Specialized hardware implementations of Artificial Neural Networks (ANNs) can offer faster execution than general-purpose microprocessors by taking advantage of reusable modules, parallel processes and specialized computational components. Modern high-density Field Programmable Gate Arrays (FPGAs) offer the required flexibility and fast design-to-implementation time with the possibility of exploiting highly parallel computations like those required by ANNs in hardware. The bounded width of the data in FPGA ANNs will add an additional error to the result of the output. This paper derives the equations of the additional error value that generate from bounded width of the data and proposed a method to reduce the effect of the error to give
... Show MoreLorraine Hansberry’s A Raisin in the Sun (1959) appeared at the beginning of renewed political activity on the part of the blacks; it is a pamphlet about the dream of recognition of black people and the confusion of purposes and means to reach such recognition. It embodies ideas that have been uncommon on the Broadway stage in any period. Situations such as a black family moving into an all-white neighborhood were not familiar before this time; they were just beginning to emerge. In depicting this so realistically, Hansberry depends more on her personal experience as an African American embittered by social prejudices and discrimination.
Psychology is one of the sciences that consciously overlap in terms of mutual influence with art forms in general and cinematic arts in particular. The psychological effect can be extrapolated into the visual image through the characters and their actions, especially the adoption of psychoanalytic ideas and proposals that came by (Freud), The cinema benefited from the concepts of psychology and participated in the process of creativity and the manufacture of events or the actions of characters, such as the concepts of consciousness and subconsciousness to express the psychological dimension of the film events, these data can be counted on the level of nightmares in the cinematic movies.
The methodological framework included the rese
كانت وسائل الاعلام- التقليدية والحديثة – وستبقى وسيلة مهمة لتدفق المعلومات والتعبير عن المشاعر ووصف الاحداث وتشكيل الرأي العام المحلي والدولي عن مختلف القضايا التي تهم الافراد والمجتمعات وفي مقدمتها قضايا العنف بمستوياته كافة ،والتطرف الديني والارهاب بكل مسمياته وستحاول هذه الدراسة ان تقدم اجابات عن اسئلة محددة تمثل الاطار النظري لدراسات مسحية ترصد النظريات التي ترسم الاطر النظرية الت
... Show MoreThe Economist opinion (views) gathered on the great Importance’s of small enterprise on the production sectors at Developed or in developing countries, statistics indicate that these enterprise represent almost 90% of the total enterprises in most economies in the world.
Many of these enterprises have originated in Iraq since the beginning of last century and the question of financing these enterprises remained an issue facing the most of workers in this sector, because of the peculiarty of which are characterized by which as a lack of financial abilities and the difficulty of obtain the sources of financing in Iraq and considered the enterprise as the guarantor of fulfilling Financial obligations. Afte
... Show MoreThis paper presents the Extended State Observer (ESO) based repetitive control (RC) for piezoelectric actuator (PEA) based nano-positioning systems. The system stability is proved using Linear Matrix Inequalities (LMIs), which guarantees the asymptotic stability of the system. The ESObased RC used in this paper has the ability to eliminate periodic disturbances, aperiodic disturbances and model uncertainties. Moreover, ESO can be tuned using only two parameters and the model free approach of ESO-based RC, makes it an ideal solution to overcome the challenges of nano-positioning system control. Different types of periodic and aperiodic disturbances are used in simulation to demonstrate the effectiveness of the algorithm. The comparison studi
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More