This study was conducted in the poultry field of the Department of Animal Production - Faculty of Agriculture - University of Baghdad (Abu Ghraib) for the period from 28/9/2017 to 9/11/2017 for a period of six weeks (42 days), was used in the experiment 300 chick of broiler (Ross 308) one day old. The aim of this study was to effect of adding supplementing different levels of bee pollen (0, 250, 500, 750 and 1000) gm/100kg on Productive Performance. The chicks were randomly distributed in to five treatments, T1 control (without any addition), (T2, T3, T4 and T5) adding bee pollen in the diet 250, 500, 750 and 1000 gm/100kg respectively. The results showed that bee pollen in the diet level 1000 gm/100 kg led to significant increase in the weight body rate, Cumulative feed consumption rate, dressing with edible bowels and without Edible bowels. While, no significant differences were found in total weight gain, total the food conversion and relative weight for heart, liver and Abdominal fat
RNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce
... Show MoreCybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t
The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreVol. 6, Issue 1 (2025)
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreTolerance and its impact on building society
For the graph , the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.