Cowpea is a very important legume in Nigeria that is being utilized to Substitute high-cost animal protein for low-income people. The knowledge of some physical properties of various moisture contents is of utmost importance in the design of its handling and processing equipment and machinery, which is the aim of this work, which studied the physical properties of IT99K-573-1-1 (SAMPEA14) variety of Cowpea within 8.77 to 21.58 % db moisture content. The properties studied include Major, Intermediate, and Minor diameters, Sphericity, Surface area, Specific gravity, Volume, Bulk density, 50-tap density, 100-tap density, 1250-tap density, seed mass, Angle of repose, Geometric mean diameter, and Arithmetic mean diameter. The obtained results indicate that the Size, Sphericity, Geometric, Arithmetic diameter, Surface area, and seed mass increase linearly with an increase in moisture content by 13.8%, 27.4%, and 16.1% for the size, respectively. While sphericity rises by 7.5% and geometric mean diameter, arithmetic mean diameter, surface area, and grain mass increase by 22.2%, 20.7%, 24.9%, and 16.11%, respectively. Specific gravity, density, and repose angle were inversely linearly related to moisture content. Regression equations for each of the properties related to the grains' moisture content were developed.
Ischemic heart disease is a major causes of heart failure. Heart failure patients have predominantly left ventricular dysfunction (systolic or diastolic dysfunction, or both). Acute heart failure is most commonly caused by reduced myocardial contractility, and increased LV stiffness. We performed echocardiography and gated SPECT with Tc99m MIBI within 263 patients and 166 normal individuals. Left ventricular end systolic volume (LVESV), left ventricular end diastolic volume (LVEDV), and left ventricular ejection fraction (LVEF) were measured. For all degrees of ischemia, there was a significant difference between ejection fraction values measured by SPECT and echo
Methotrexate (MTX) is one of the most effective medications to treat rheumatoid arthritis (RA).Aserum of 60 Iraqi male patients suffering from RA as (G1) was newly diagnosis and the same patient in G1 after taking MTX as G2 and 40 Iraqi male healthy control as G3. Nesfatin-1 (Nf-1) is belong to the adipokine family withpleiotropic effect. Nf-1 has been found in different tissues, including stomach, pancreas, bone cells, cartilage and heart. Retinol binding protein (RBP4) was known as transpoter of retinol from its storage sites in the liver to the extrahepatic tissues. Moreover, RBP4 acts as adipokine and contributes in the pathophsyology of prototypic inflammatory disease, rheumatoid arthritis (RA). The results showed a significant increas
... Show MoreThe aim of this essay is to use a single-index model in developing and adjusting Fama-MacBeth. Penalized smoothing spline regression technique (SIMPLS) foresaw this adjustment. Two generalized cross-validation techniques, Generalized Cross Validation Grid (GGCV) and Generalized Cross Validation Fast (FGCV), anticipated the regular value of smoothing covered under this technique. Due to the two-steps nature of the Fama-MacBeth model, this estimation generated four estimates: SIMPLS(FGCV) - SIMPLS(FGCV), SIMPLS(FGCV) - SIM PLS(GGCV), SIMPLS(GGCV) - SIMPLS(FGCV), SIM PLS(GGCV) - SIM PLS(GGCV). Three-factor Fama-French model—market risk premium, size factor, value factor, and their implication for excess stock returns and portfolio return
... Show MoreThe Arab-Israeli conflict passed through several stages before reaching the final stage of normalization, namely conflict, conflict and public normalization. Thus, the UAE became the third country to establish official relations with Israel after Egypt in 1979 and Jordan in 1994. With the announcement of the normalization agreement, opinions varied between supporters and opponents of the idea of normalization with Israel, and some countries expressed their acceptance of establishing official relations between the Emirates and Israel, while others warned of the consequences of normalization, which they described as treachery. Although the UAE confirmed that the normalization agreement between the two sides was credited with stopping Israel's
... Show Moreيعد هذا النص أحد النصوص المسمارية المصادرة التي بحوزة المتحف العراقي، ويحمل الرقم المتحفي (235869)، قياساته )12،7x 6x 2،5سم). يتضمن مدخولات كميات من الشعير،أرخ النص الى عصر أور الثالثة (2012-2004 ق.م) و يعود الى السنة الثالثة من حكم الملك أبي-سين (2028-2004 ق.م)،أن الشخصية الرئيسة في هذا النص هو)با-اَ-كا مسمن الماشية( من مدينة أري-ساكرك، ومقارنته مع النصوص المسمارية المنشورة التي تعود الى أرشيفه يبلغ عددها (196) نصاً تضمنت نشاطاته م
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More