This study carried out in animal field in the Department of animal production /Faculty of Agriculture /University of Baghdad, Al Gadria Campus. 80 Japanese quail divided into four parameters used in this study. These quails are treated with boron (B) in the diets (boric acid 16% B) with concentration 0, 50, 75, 100 mg /kg. diets for 120 hours. the following characteristics are examined: changes in the rate of body weight (BL), concentrate of hemoglobin (Hb), hematocrit (PCV%), and the ratio of heterophile to Lymphocyte (H/L ratio). The results indicated that the high levels of B led to a Significant decrease in BL and significantly increased in hematocrit PCV% with significant decrease in Hb, and increasing in the H/L ratio. The anatomy of birds showed that there are gross lesions in each of the liver and kidneys. The current study concludes that the use of B in high concentrations in the fodder of quails led to the toxic effects that lead to the physiological deterioration of birds but it was not fatal
The research aims to monitor and analyze the visual and symbolic features, derived from the Omani heritage, and inspired by the concept of local identity, for a selection of contemporary Omani graphic art works, which represent a mixed, multi-category of research sample, comprising three levels: the works of professional Omani artists, and the works of young artists and specialized students, as well as the work of a number of active academics in the field of graphic theorizing and teaching. The sample is also divided - in terms of technical classification - into a category of works executed using traditional engraving and printing media, and a category of works executed using modern and digital graphic printing media.
Through the da
The other is a problematic concept and can be achieved only by the existence of difference and differentiation between human groups in views and views, the other is out of the ego, which is different religiously, politically, socially, culturally, place and language.
We take from the Iraqi feminist novel analytical field to reflect the image of the other in the novelist world, and the models chosen for the study are: the novel granddaughter of American novelist Anaam Kjie Ji, and novel how the sky seemed close to the novelist Batoul al-Khudairi, and novel when you wake up the smell of novelist Dni Ghali, and the rope of the umbilical and the novel Shufuni Shufuni The novel by Samira Al-Manea, the novelist of the novelist Alia Mamdouh,
The present study devoted to determine the ultimate lateral carrying capacity of piles foundation in contaminated clayey soils and subjected to lateral cyclical loading. Two methods have been used to calculate the lateral carrying capacity of piles foundation; the first one is two-line slopes intersection method (TLSI) and the second method is a modified model of soil degradation. The model proposed by Heerama and then developed by Smith has been modified to take into consideration the effects of heavy loads and soil contamination. The ultimate lateral carrying capacity of single pile and piles group (2×2) driven into samples of contaminated clayey soils have been calculated by using the two methods. Clayey soil samples are contami
... Show MoreMany international companies have branches or agencies in Iraq and have large market shares, and this has contributed to the increase in the import of these companies' products. This process created an additional problem of handling a large number of expired or defective products. There are many methods that contribute significantly to reducing these problems. The most prominent of these is the activation of reverse logistics options in Iraq by international and local companies. This research aims to conduct a survey of the reverse logistics options approved by some local and international companies and compare between them. This paper found that Amaron, Hitachi, Apple, Samsung and Huawei have limited options for reverse logistics and that
... Show MoreThe objective of the investigation was to analyze the structure and administration of the political system in Iraq (post-ISIS). After 2003, the Iraqi political system suffered the fundamental problem of its failure to achieve the political and social inclusion that characterizes democratic systems, to guarantee the establishment of a "state for all", while respecting differences. Political representation has moved from the system of sectarian ethnic components, under the title of consensual democracy, to the representation of leaders and the realization of their interests and the interests of their parties at the expense of the groups that claim to represent them, which complicates the problem. In this sense, the new political syste
... Show MoreUndoubtedly, Road Traffic Accidents (RTAs) are a major dilemma in term of mortality and morbidity facing the road users as well as the traffic and road authorities. Since 2002, the population in Iraq has increased by 49 percent and the number of vehicles by three folds. Consequently, these increases were unfortunately combined with rising the RTAs number, mortality and morbidity. Alongside the humanitarian tragedies, every year, there are considerable economic losses in Iraq lost due to the epidemic of RTAs. Given the necessity of understanding the contributory factors related to RTAs for the implementation by traffic and road authorities to improve the road safety, the necessity have been a rise for
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More