Preferred Language
Articles
/
ghYPv4sBVTCNdQwCqton
Effect of adding different levels from bee pollen in diet on productive performance of broiler chickens
...Show More Authors

This study was conducted in the poultry field of the Department of Animal Production - Faculty of Agriculture - University of Baghdad (Abu Ghraib) for the period from 28/9/2017 to 9/11/2017 for a period of six weeks (42 days), was used in the experiment 300 chick of broiler (Ross 308) one day old. The aim of this study was to effect of adding supplementing different levels of bee pollen (0, 250, 500, 750 and 1000) gm/100kg on Productive Performance. The chicks were randomly distributed in to five treatments, T1 control (without any addition), (T2, T3, T4 and T5) adding bee pollen in the diet 250, 500, 750 and 1000 gm/100kg respectively. The results showed that bee pollen in the diet level 1000 gm/100 kg led to significant increase in the weight body rate, Cumulative feed consumption rate, dressing with edible bowels and without Edible bowels. While, no significant differences were found in total weight gain, total the food conversion and relative weight for heart, liver and Abdominal fat

Scopus
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
CFD Application on Shell and Double Concentric Tube Heat Exchanger
...Show More Authors

This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).

Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors.  The RNG k-ε model of turbulence is used to determining the accurate results from CFD.

The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 24 2018
Journal Name
2018 Aiaa/ceas Aeroacoustics Conference
Mimicking the serration effects on aerofoil by leading edge blowing
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
On Fully Stable Banach Algebra Modules Relative to an Ideal
...Show More Authors

In this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
An efficient multistage CBIR based on Squared Krawtchouk-Tchebichef polynomials
...Show More Authors
Abstract<p>Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p</p> ... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Sat Oct 29 2022
Journal Name
Computers
Intelligent Robotic Welding Based on a Computer Vision Technology Approach
...Show More Authors

Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel

... Show More
View Publication
Scopus (12)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Thu Jan 30 2014
Journal Name
Al-kindy College Medical Journal
The Eff ffectt off Septtopllastty on IInfferr iiorr Turrbiinatte Siize
...Show More Authors

Bac kground:: Septal deviation is one of the commonest anatomical deformities of the nasal skeleton, this deviation is usually accompanied by compensatory hypertrophy of the inferior turbinate on the concave side that will accentuate the severity of nasal obstruction.
Objectives: To evaluate the effect of septoplasty on the size of the inferior turbinate in patients with nasal septum deviation.
Methods: This is a prospective study of 25 patients attending the otolaryngological department at Al-Jirahat teaching hospital from September 2011 to November 2013, complaining mainly of nasal obstruction. Otolaryngological examination had shown nasal septum deviation. The cross sectional areas of inferior turbinates were measured with compu

... Show More
View Publication Preview PDF