This study was conducted in the poultry field of Al-Mustansiriya University/ Baghdad, to show the effect of adding different levels 0, 1, 5 and 10% of the fenugreek seeds in the rations containing many contaminated microbes on the productive performance of broilers. 150-day-old rose meat was used with a 41 average weight (gm), were randomly allocated to 4 treatments with 3 replicates, and for each treatment 15 chicks per repetition: 0, 1, 5, and 10% (T0-T3), respectively. The results of this study showed that fenugreek seeds contain good amounts of protein, fat, ash and carbohydrates, which are 24.92, 8.82, 3.08 and 54.28 respectively. Fenugreek seeds also have high levels of tannins, coumarins and flavones, followed by saponins, alkaloids, resins and starch. While the fenugreek seeds were distinguished by their lack of glycosides. In addition, the fenugreek was characterized by containing significant quantities of fatty acids such as oleic, linoleic and linolenic acids by 32.54, 55.04 and 4.55% respectively. The results of this study showed significant superiority (P<0.05) for treatment T2 from adding seeds Fenugreek over the rest of the transactions in the average body weight, weight gain and food conversion factor. As for the feed conversion factor, the T2 treatment also recorded (adding 5% of fenugreek seeds) a significant improvement (P<0.05) compared to the control treatment. The results showed a significant superiority of (P<0.05) in the measure of the productive evidence for the T2 treatment compared to the control treatment. Followed by the addition of 1% of fenugreek seeds had a moderate significant increase, while an increase of the addition rate of 10% decreased the weighted production percentage of chicks with a significant decrease compared to the control treatment.
A principal problem of any internet user is the increasing number of spam, which became a great problem today. Therefore, spam filtering has become a research fo-cus that attracts the attention of several security researchers and practitioners. Spam filtering can be viewed as a two-class classification problem. To this end, this paper proposes a spam filtering approach based on Possibilistic c-Means (PCM) algorithm and weighted distance coined as (WFCM) that can efficiently distinguish between spam and legitimate email messages. The objective of the formulated fuzzy problem is to construct two fuzzy clusters: spam and email clusters. The weight assignment is set by information gain algorithm. Experimental results on spam based benchmark
... Show Moreto study the discribrion and the pollution in the environment in the south of baghdad samples of waste water from industrail units using the mercury in its process also
Implementing smart community engagement should consider careful planning and collaboration with numerous stakeholders, including the community. The technology and program must be designed to frame its purpose and should link back to specific goals of implementing smart community engagement. Digital services do not guarantee a smart engagement between the community and the local government. This is the case for the Kubang Pasu local government where several online services have been provided in their attempt to implement the smart community concept. However, understanding on the preferences of features and requirements of existing web-based systems and the impact of these systems is lacking. Therefore, a perception study needs to be condu
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreThe rapid development of automation industries and technologies has shown incredible prospects for transforming our homes into a smart home automation system, which are more secure than a simple home. This paper proposes a home application based on voice and text called the Automated Control and Monitoring System (ASCM). This application can be utilized by both normal and vision-impaired people by using with a mobile phone.
The application allows users to send voice commands through Google Assistant installed on Android to control the appliances. They can also have complete monitoring by logging onto the ThingSpeak dashboard, which displays a device status indicator and sends alert messages in the event of dang
... Show MoreThis research aimed to examine the effect of concentration of dyes stuff, contact time, temperature and ratio of adsorbent weight in (gm) to volume of solution in (ml) on the percentage removal. Two dyes were used; direct blue 6 and direct yellow and the adsorbent was the maize cob. Batch experiments were performed by contacting different weights of adsorbent with 50 ml of solution of desired concentration with continuous stirring at various temperatures. The percentage of removal was calculated and the maximum percentage of removal was 80%. And as the concentration of solution, contact time, temperature and the ratio of adsorbent to volume of solution increase the percentage of removal increase.
Intelligent Transportation Systems (ITS) have been developed to improve the efficiency and safety of road transport by using new technologies for communication. Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) are a subset of ITS widely used to solve different issues associated with transportation in cities. Road traffic congestion is still the most significant problem that causes important economic and productivity damages, as well as increasing environmental effects. This paper introduces an early traffic congestion alert system in a vehicular network, using the internet of things (IoT) and fuzzy logic, for optimizing the traffic and increasing the flow. The proposed system detects critical driving conditions, or any emerge
... Show MoreIn this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A comparison between numerical and experimental data, illustrated
... Show MoreBackground: Chronic hepatitis B virus (HBV) infection is a common health problem that has a worldwide distribution. Apart from the direct effect of the virus on the liver, there are many extrahepatic manifestations among which the probable effect on bone turnover associated with low bone mineral density (BMD). Objectives: This study aimed to determine the association between treated and untreated chronic HBV infection with BMD. Methods: This is a cross-sectional study which included a total of 48 patients with chronic HBV (28 patients treated with tenofovir-disoproxil-fumarate [TDF] antiviral drug and 20 patients have not yet started treatment). Other age- and sex-matched 30 apparently healthy individuals were recruited to represent the hea
... Show More