The amino acids in the liver of chick embryo was analysed for ages (7, 11, 14 and 19) days incubation and small chicken aged (14) days after hatching and adult. The study recorded (18) amino acid, the highest concentration of amino acids in the liver of embryo age (7) days incubation was Cysteine (Cys) and in small chicken aged (14) day after hatching, the following amino acids were found: Asparagine (Asn), Alanine (Ala), Histidine (His), Threonine (Thr), Valine (Val), Lysine (Lys), as well as in adult the following amino acids were recorded the highest concentration: Aspartic (Asp), Glutamic (Glu), Serine (Ser), Arginine (Arg), Proline (Pro), Glycine (Gly), Tyrosine (Tyr), Methionine (Met), Isoleucine (Ile), Leucine (Leu) and phenyl alanine (Phe). The lowest concentration of the amino acid was in embryo age (14) day incubation and include: Asparagine (Asn), Alanine (Ala), Glycine (Gly), Threonine (Thr), Tyrosine (Tyr), Valine (Val), Methionine (Met), histidine (His), Isoleucine (Ile) and Leucine (Leu), as well as at embryo age (19) day incubation which were: Serine (Ser), Cysteine (Cys) and Proline (Pro), whilethe low concentrations of amino acids include: Aspartic (Asp), Glutamic (Glu), Arginine (Arg) and Phenyl alanine (Phe).The statistical findings showed high significant differences between all ages mentioned and the amino acids except for lysine amino acid (Lys), which did not show any significant differences among all ages.
The present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) impolite
... Show MorePhotovoltaic devices (PVs) were fabricated by spray-coating an ink of copper indium diselenide CuInSeR 2 R(CIS) nanocrystals as the light-absorbing layer. Without high-temperature post-deposition annealing, PVs were made on glass substrates with power conversion efficiencies of up to 1.5% and 0.9%, for Au and Mo coated respectively, under AM 1.5 illumination. UV–Vis spectrophotometer in the wavelength range 350–1500 nm. X-ray diffraction (XRD) and energy dispersive spectroscopy (EDS) analysis it is evident that CuInSeR 2 R have the chalcopyrite structure as the major phase and no secondary phase with a preferred orientation along (112) direction and The atomic ratio of Cu : In : Se in the nanocrystals is nearly 1 : 1 : 2.
Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreAbstract The goal of current study was to identify the relationship between addiction of self-images (Selfie) and personality disorder of narcissus, and the difference of significance the relationship between addiction self-images (selfie) and personality disorder narcissus at students of Mustansiriya university, addiction self- images (selfie) defined: a photograph that one has taken of oneself, typically one taken with a smartphone or webcam and shared via social media, edit and down lowed to social networking sites, and over time, the replacement of normal life virtual world, which is accompanied by a lack of a sense of time, and the formation of repeated patterns increase the risk of social and personal problems. To achieve the goals
... Show MoreThis study aimed to find out the impact of work-life balance on employee satisfaction in five-star hotels in Amman, Jordan based on a descriptive analytical approach. The questionnaire of the survey was designed and distributed to a sample of participants in order to collect the necessary data for this study and they were analyzed later through the SPSS V22 program. The study population was the hotel sector in Jordan, while the study sample included the five-star hotels in the capital, Amman, and the sampling unit included the employees of the middle and lower levels of management in the five-star hotels in Amman. The study showed a number of results, including the existence of a good level of work-life balance by employees in top manage-me
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreIR, MIR, UV – Visible spectra have been studied for Cobalt chloride molecule (CoCl2. 6H2O) compound, In wide range spectra (40000 – 410) cm-1 specially MIR range. Assignment were achieved for the fundamental vibrational bands of (CoCl2 . 6H2O ) to symmetry stretching ?1 (?^+) Anti – symmetry stretching ?3(?^+), these bands are non-degenerate , and the bending band is ?2(?) is doubly degenerate thought they have activity in IR and Raman , which explain the weakness in symmetry of this molecule, the fundamental bands for the molecule are centered at the following wave numbers (615, 685, 795, 1115, 1340, 1375, 1616.35, 2091, 2386, 2410, 3364) cm-1 which are corresponding to wave lengths (16260, 14598, 12578, 8968, 7462, 7272, 6186,
... Show More