Dried imported blood worms Chironomus reparius was used to motivate the growth of young carp Cyprinus carpio L ., as fish powder was partial and total replaced by blood worms which is a component of the fodder of the common carp fish. Results have shown that blood worm partial replacement treatment surpasses the imported fish powder. Rates of growth motivation of this treatment have been higher than both the control and total replacement processes. Results have shown significant differences in the weight of the fish in the partial replacement of the fish powder by the blood worms.
Background: Radiopacity is one of the prerequisites for dental materials, especially for composite restorations. It's essential for easy detection of secondary dental caries as well as observation of the radiographic interface between the materials and tooth structure. The aim of this study to assess the difference in radiopacity of different resin composites using a digital x-ray system. Materials and methods: Ten specimens (6mm diameter and 1mm thickness) of three types of composite resins (Evetric, Estelite Sigma Quick,and G-aenial) were fabricated using Teflon mold. The radiopacity was assessed using dental radiography equipment in combination with a phosphor plate digital system and a grey scale value aluminum step wedge with thickness
... Show MoreMan always reacts by employing data that he lives inside Artworks and he tries to make them an ideal speech that shows the most important intellectual trends to which he belongs, as it happened in the formal building of the ancient arts . Mesopotamia is one of the civilizations that interacted with the intellectual legibility transforming into visual symbols, so it is difficult for the researcher to interpret these symbols without considering the nature of these civilizations in general .
This current search aims to identify similarities and differences in the recruitment of cultural shapes between the works of the sculptors (Mohammed Ghani Hikmat and Murtada Haddad) .
Researcher adopted an approach of analytical description of the
The importance of the interpretation of the Holy Qur’an is that it is a necessity that accompanies Muslim throughout his life, it helps him to solve his problems, it is a way of gaining advanced knowledge, it facilitates the Muslim's understanding of the Holy Qur’an and to know God’s Almighty’s intent in His verses. Since there are so many needs that a person strives to achieve, therefore, the interpretation of the Holy Qur'an would be satisfactory to him and it facilitates the fulfillment of these needs within the limits of legal laws. The aim of the researcher is to get acquainted with the method of that honoured interpreter in his interpretation, and his ability to benefit Muslims in explaining the verses and come to a solutio
... Show MoreThe large number of failure in electrical power plant leads to the sudden stopping of work. In some cases, the necessary reserve materials are not available for maintenance which leads to interrupt of power generation in the electrical power plant unit. The present study, deals with the determination of availability aspects of generator in unit 5 of Al-Dourra electric power plant. In order to evaluate this generator's availability performance, a wide range of studies have been conducted to gather accurate information at the level of detail considered suitable to achieve the availability analysis aim. The Weibull Distribution is used to perform the reliability analysis via Minitab 17, and Artificial Neural Networks (ANNs) by approaching o
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show Moreالخلاصة
یعد والت وتمن شاعرا استثنائیا سواء أكان ذلك في المكانة التي یحتلھا في الأدب الأمریكي او في نمط
اع t ذا الإیق t لة ھ t ة وص t وافقي خاص t اع الت t تخدامھ الإیق t ي اس t دي ف t ر تقلی t عرا غی t الشعر الذي یكتبھ. لقد كتب وتمن ش
ل t ة للتوص t ف الطبیع t وافقي لوص t اع ا لت t ن الإیق t تخدم وتم t ر ، اس t بوحدة الكون الذي عبر عنھ في شعره.وبمعنى آخ
نص t ل ال t جام داخ t رابط وانس t یج مت t ھ نس t ق انظم t دف لخل t ھ تھ t اھره أدبی t واف