The aim of this study is to know the effect of different percentages of chitosan added to drinking water on the weight and quality of quail meat, physical anatomy in terms of (the body of the long carcass, the girth of the chest, the length of the thigh bones, the thigh racket, the fullness of the chest), chemical analysis (protein, moisture, fat and ash) and sensory evaluation of quail meat. It was purchased 320 Iraqi-origin birds of quail and one day old. Chicks were randomly distributed to three equal groups' treatments and treated with chitosan and added to the drinking water: the first treatment (0.1 gm./L water only as a control treatment), the second treatment (0.2 gm./L of chitosan was added to the drinking water) and the third treatment (0.3 gm./L of chitosan was added to the drinking water).The results showed a significant difference (p≤ 0.05) between groups in carcass cutting, physical anatomy, measurement of carcass parts and chemical analysis, as well as a significant and clear improvement in the sensory characteristics of quail meat with a concentration of 0.2 gm./L chitosan. We conclude from this that adding low concentrations of chitosan to the drinking water of quail birds showed a significant difference in growth performance, meat quality, chemical composition, carcass weights and physical anatomy, as well as improving sensory characteristics and quality of quail meat.
Introduction: Salivary melatonin is a critical antioxidant that contributes to oral health by mitigating oxidative stress. Psychological stress linked to thumb sucking may disrupt oral homeostasis, leading to conditions such as dental caries and fungal infections. Aim: This study explores the relationships between thumb sucking, salivary melatonin levels, dental caries, and the presence of Candida albicans (CA) in children. Materials and methods: A case-control study was conducted with 60 children aged 4-5 years at the University of Baghdad’s College of Dentistry. Participants were divided into thumb-sucking (n=30) and non-thumb-sucking (n=30) groups. Salivary melatonin levels were measured using enzyme-linked immunoso
... Show MoreType 2 diabetes mellitus (T2DM) is the most frequent endocrinal disease commonly associated with thyroid disorders .The study is conducted at the Specialized Center for Endocrinology and Diabetes in Baghdad ,during December 2014 up to October 2015.This study was done to investigate the prevalence of anti- thyroid peroxidase (Anti-TPO) antibody in patients suffered from type 2 diabetes with thyroid disorders .The study groups included a total number of 80 subjects consisting of 60 type 2 diabetic patients divided into 20 hyperthyroidism subjects (group 1) ,20 hypothyroidism subjects (group 2), 20 euthyroidism subjects (group 3) and 20 healthy controls (group 4) . The fasting blood samples were analyzed for (T3,T4,TSH) by using Vitek Immuno d
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show MoreSeveral specimens of the avocet, Recurvirostra avocetta L. are found infected with
Himantocestus gigantivcus sp. nov. ( Cestoda , Diploposthidae) . This cestode is related to H.
blanksoni Ukoli 1965 but easily differentiated from it in having longer and wider strobila,
larger size of testes but lesser in number, cirrus situated in the middle of mature segment
histead of anterior third and slightly posterior to the middle in gravid segment instead of the
middle , ovary and vitelline gland are larger , and the uterus has more branches.
Straight tendons in pretensioned members can cause high-tensile stresses in the concrete extreme fibers at end sections because of the absence of the bending stresses due to self-weight and superimposed loads and the dominance of the moment due to prestressing force alone. Accordingly, the concrete tensile stresses at the ends of a member prestressed with straight tendons may limit the service load capacity of the member. It is therefore important to establish limiting zone in the concrete section within which the prestressing force can be applied without causing tension in the extreme concrete fibers. Two practical methods are available to reduce the stresses at the end sections due to the prestressing force. The first method based
... Show MoreThe detection of fungi contaminating maize grain and the effect of four plant extracts Azadirachta indica, Eucalyptus globulus Glycyrrhiza glabra and Zingiber officinale on the growth of A. flavus and its ability to produce AflatoxinB1. The results showed that the incidence of Aspergillus spp., was 52.75% of the isolated fungi, of which 29.50% was due to Aspergillus flavus, followed by Penicillium spp., with an incidence of 21.06%, and then Fusarium spp., with a rate of 18.13%. The percentage of toxin-producing A. flavus isolates reached 70.8% out of 24 isolates. The results showed the effect of alcoholic plant extracts at a concentration of 10 mg/ml on the fungal growth activity of A. flavus, the alcoholic extract of neem leaves was superi
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More