Preferred Language
Articles
/
jih-409
Comparative study for Effect of the Using of Aged Garlic Extract and Row Garlic extract added to drinking water as Immune Modulators of Broiler Infected with Gomboro
...Show More Authors

   This study included the effect of Aged garlic extract (AgE) and Row garlic extract (RgE)as immune modulators for treating or redusing the infection of boiler by Gomboro.       This is made of measuring the stress index and serum antibodies levels against Gomboro virous( GV) estimated by HI,the study also detected the effect of each extract as antioxidents in broiler by estimation of peroxynitrite in serum . 300 chicks infected with Gumboro diseas brought at day ( 21 ) old and divided into three groups , the first group A was given the ( RgE ) at level of 5% with drinking water , the group B was given 5% of  ( AgE ) and group C is left as control group and wasn't given anything.     Then we collected the blood samples from chicken to make the serological test . The results  demonstrat significant decrease in stres index and level of antibodies and peroxynitrite in group B than group A . The clinical test demostrat increasing phenolic contents  (TPC) , superoxid dismutas ( SOD) and 2,2- Diphenyl-1-picrylhydrazyl  ( DPPH ) In ( AgE ) than in ( RgE ) .  So we concluded that the use of ( AgE ) with drinking water of chicks infected with  Gumboro will reduce the pathological effect of GDV  and considered as antioxidant and antistress agent and scavening the damage of cells induced from virus .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
A Lightweight Image Encryption Algorithm Based on Elliptic Curves and a 5D Logistic Map
...Show More Authors

    Cryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Pairwise Regularity and Normality Separation Axioms in C ̌ech Fuzzy Soft Bi-Closure Spaces
...Show More Authors

    In this paper, some new types of regularity axioms, namely pairwise quasi-regular, pairwise semi-regular, pairwise pseudo regular and pairwise regular are defined and studied in both ech fuzzy soft bi-closure spaces (  bicsp’s) and their induced fuzzy soft bitopological spaces. We also study the relationships between them. We show that in all these types of axioms, the hereditary property is satisfied under closed fs bi-csubsp of . Furthermore, we define some normality axioms, namely pairwise semi-normal, pairwise pseudo normal, pairwise normal and pairwise completely normal in both  bicsp’s and their induced fuzzy soft bitopological spaces, as well as their basic properties and the relationships between them are studied.

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed May 17 2017
Journal Name
Helminthologia
Baylisascaris procyonis roundworm infection patterns in raccoons (Procyon lotor) from Missouri and Arkansas, USA
...Show More Authors
Summary<p> Baylisascaris procyonis is a helminth parasite of raccoons Procyon lotor and represents a health concern in paratenic hosts, including humans and diverse domestic and wildlife species. In North America the helminth is expanding its geographic range. To better understand patterns of infection in the Ozark region of the USA, raccoons (n = 61) were collected in 2013-2014 from five counties in Missouri and Arkansas, USA and necropsied. We documented B. procyonis in all surveyed locations. The overall prevalence of B. procyonis was 44.3 % (95 % CI = 31.9 - 57.4) and was significantly higher in females than males. There were also significant differences in prevalence among raccoons sampled </p> ... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Dec 10 2018
Journal Name
Day 3 Wed, December 12, 2018
Experimental Comparison between WASP and LSASF in Bartlesville Sandstone Reservoir Cores Bearing Heavy Oil
...Show More Authors

Low salinity (LS) water flooding is a promising EOR method which has been examined by many experimental studies and field pilots for a variety of reservoirs and oils. This paper investigates applying LS flooding to a heavy oil. Increasing the LS water temperature improves heavy oil recovery by achieving higher sweep efficiency and improving oil mobility by lowering its viscosity. Steam flooding projects have reported many problems such as steam gravity override, but override can be lessened if the steam is is alternated with hot LS water. In this study, a series of reservoir sandstone cores were obtained from Bartlesville Sandstone (in Eastern Kansas) and aged with heavy crude oil (from the same reservoir) at 95°C for 45 days. Five reservo

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Fri Jan 08 2010
Journal Name
Al-kindy College Medical Journal
Maternal and fetal outcomes in emergency versus elective two or more previous cesarean deliveries
...Show More Authors

Publication Date
Tue Feb 25 2025
Journal Name
Al–bahith Al–a'alami
DEVOTING MEDIA PLURALISM THROUGH ACHIEVING CULTURAL DIVERSITY IN DIGITAL MEDIA: : (Features, Constituents And Obstacles )
...Show More Authors

The media of all kinds have the task of introducing, expressing and objectively representing the cultures of different societies in various types and forms of press and media. The precept of media pluralism is the basis for freedom of expression & the cornerstone of its realization. Therefore, it is linked to the establishment of several conditions and elements in order to establish it as a principle and practice. Issues of cultural diversity in media and cultural pluralism are one of the most important elements and indicators. So, this paper aims to shed light on the concept of media pluralism and related concepts within the framework of cultural diversity and multicultural indicators. Thus, highlighting the feature

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 23 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Exploitation decision and impact factors in improvement in stock exchange markets proportion investment small
...Show More Authors

The purpose of the search definition on factors superior this whoever  impact on the improvement the exploitation  decision this  detect on stock exchange markets  assumption , and using  questioners to data accumulate  and the Iraq market of financial papers  battleground to search annoy chose the eyeball extension (47) peoples from peoples employees on the market , and using the bought statistic program (SPSS) on input and analysis search  data , and machinate the search outputs to their group of factors internal and external which impact on exploitation  decision on financial papers markets , and the search commend on necessary rise  the incumbency direction  in the stock exchange

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 25 2009
Journal Name
Wireless Personal Communications
A N-Radon Based OFDM Trasceivers Design and Performance Simulation Over Different Channel Models
...Show More Authors

In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Al-khwarizmi Engineering Journal
Citric Acid Production: Raw Material, Microbial Production, Fermentation Strategy and Global Market: Critical Review
...Show More Authors

Citric acid is an essential ingredient for the manufacture of (12) key industrial chemicals. Citric acid use is increasing steadily with a high annual growth rate as a result of the development of ever more sophisticated applications. Citric acid is widely utilized in the food and pharmaceutical industries due to its low toxicity when compared to other acidulous. Other uses for citric acid can be found in cleaning supplies and detergents. Based on information from a review of the literature, Citric acid production substrates and methods for surface fermentation, submerged fermentation, solid-state fermentation, and international market expansion are all covered in the current review study. Finally, there is still much to learn about the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref