The study was conducted to show the effect of using dried rumen powder as a source of animal protein in the diets of common carp (Cyprinus carpio L.) on its performance, in the fish laboratory/College of Agricultural Engineering Sciences/University of Baghdad/ for a period of 70 d, 70 fingerlings were used with an average starting weight of 30±3 g, with a live mass rate of 202±2 g, randomly distributed among five treatments, two replicates for each treatment and seven fish for each replicate. Five diets of almost identical protein content and different percentages of addition of dried rumen powder were added. 25% was added to treatment T2 and 50% to treatment T3 and 75% of the treatment T4 and 100% of the treatment T5 In addition to the control treatment T1, which was devoid of dried rumen powder, the fish were fed on experimental diets of 4% of their body weight and weighed every 15 d. The results showed that the T2 treatment was one of the best experimental treatments, as it gave the highest levels for most of the studied traits. The results indicated that there were significant differences (p>0.01) and (P < 0.05) between it and the control treatment T1 in growth parameters, which included the final weight average of 715 g and the rate of increase The total weight is 512.50 g, the daily weight gain rate is 12.32 g/d, the relative growth rate is 252.47%, and the specific growth rate is 1.75 g/d. The criteria for evaluating the diet, which included the amount of feed intake 1765.26 g and the amount of protein intake 577.41 g, and the best food conversion ratio of 3.44 and the efficiency of food conversion was 29.03 % and the value of the protein produced is 64.21% and the net exploited protein is 0.73%. We conclude from the current study that the dried rumen powder can be used by 25% in the diets of common carp (Cyprinus carpio L.) as a partial substitute for imported animal protein because it contributed to improving production performance. It can also be used Dried rumen powder at rates of 50 and 75%, but did not reach the levels achieved by 25%.
l
Tekrarlar, anlamı kuvvetlendirmek, ifadeyi zenginleştirmek amacıyla kullanılan dil unsurlarıdır. Ural Batır destanı da tekrarlar, özellikle de ikilemeler açısından zengindir. Bu yazıda, Ural Batır destanındaki ikilemeler gruplandırılarak verilecek ve değerlendirmesi yapılacaktır.
Abstract
Word repeating is language items used for strengthen the meaning and riching the expression. By this view, Ural Batır epic is a good example for word repeating units. In this paper, Ural Batır epic’s word repeating has been presented by classification.
This research aims to invest qur›anic words referring to lie in media language. The researcher has chosen a set of qur›anic words functioning as «lie».
It is an attempt to review the media language which is used to make use of repetition of terms and templated which make it weak and ineffective language. The use of qur›anic texts and terms according to the semantic field for each topic will give this media language an opportunity for growth, development and stability.
This researcher identifies a number of words to study them in the light of their lexical meaning using the Dictionary of Language Standards by Ibn Fares as it focuses on the general meaning of the root language. He also uses the Dictionary of the Basis of Rhe
Nigella sativa has various pharmacological properties and has been used throughout history for a variety of reasons. However, there is limited data about the effects of N. sativa (NS) on human cancer cells. This study aimed at observing the roles of methanolic extract of N. sativa on apoptosis and autophagy pathway in the Human PC3 (prostate cancer) cell line. The cell viability was checked by MTT assay. Clonogenic assay was performed to demonstrate clonogenicity and Western blot was used to check caspase-3, TIGAR, p53, and LC3 protein expression. The results demonstrated that PC3 cell proliferation was inhibited, caspase-3 and p53 protein expression was induced, and LC3 protein expression was modulated. The clonogenic assay showed that PC3
... Show MoreThe research aimed at identifying the level of Acute stress disorder and orientation towards supplication among the wives of the martyrs and knowledge of the two levels according to the age groups, academic achievement and profession. Sample of (72) wife of a martyr, and the results of the research indicated that the wives of the martyrs have symptoms of distress disorder and have adherence to the supplication to alleviate that disorder, as well as the results indicated that there are statistical differences in distress disturbance according to the variable of age groups, the profession variable and the variable of enrollment The academic year. As for the measure of the trend towards supplication, there are no statistical dif
... Show MoreAbstract: In the current research the absorption and fluorescence spectrum of Coumarin (334) and Rhodamine (590) in ethanol solvent at different concentration (10-3, 10-4, 10-5) M had been studied. The absorption intensity of these dyes increases as the Concentration increase in addition to that the spectrum was shifted towards the longer wavelength (red shift). The energy transfer process has been investigated after achievement this condition. The fluorescence peak intensity of donor molecule was decrease and its bandwidth will increases on the contrary of the acceptor molecule its intensity increase gradually and its bandwidth decreases as the acceptor concentration increase.
With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreAbstract
Currently, the “moderate discourse and civil peace” represents a rich and important topic for scholars, due the rise of waves of extremism and Islamophobia campaigns, and what that leads to in term of imbalance in relations between nations and peoples.
Based on that, the research approach was to tackle the culture of hatred and calls for the clash of civilizations.
In order to contribute to solving these problems caused by cultural and religious prejudices, I decided to address the topic of “moderate discourse and civil peace” through two essential axes:
- Features of moderate religious discourse
- The role of moderate discourse in establishing communit
Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota
... Show More