Preferred Language
Articles
/
uxeEppIBVTCNdQwCLLxg
EFFECT OF EARLY EXPOSURE TO HEAT AND ADDITION OF GINSENG EXTRACT ON PRODUCTION TRAITS IN BROILER CHICKS
...Show More Authors

The current study was conducted on 504(Ros-308) broiler chicks during the period 28/9/2017-9/11/2018to determine the effect of heat shock in early age and additives such as ginseng in three levels on birds weight and feedconsumption. Results showed that the exposure to high temperature (38-400C) lead to significant decrease (p≤≤≤≤≤0.05 (inaverage body weight at7 day of age and significant decrease in body weight in birds expousured to high temperature inthe periods 2, 4 and 6 hours compared with control (Table 1). Significant decrease in live body weight when exposure to2hr compared with 6hr namely (138.54) and (144.21), respectively while no significant difference between 2 and 4h.Results showed no significant effect in body weight in control group compared with the group that fed on diet containginseng extract with or without vitamins and minerals. Interaction between exposure time and ginseng extract on bodygain weight all ages, the height body gain was noticed in P0G2 at 24days at age (514.78 gm). While, the lowest value wasin P6G0 (275.78) Accumulative body gain was differed significantly P2G2(2514.22 gm) compared with P6G0(2054.45 gm)

Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Aci Structural Journal
Stress at Ultimate in Internally Unbonded Steel Based on Genetic Expression Programming
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Propose an Efficient Face Recognition Model in WSN Based on Zak Transform
...Show More Authors

The need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Proposed Hiding Text in Text Based On RNA for Encoding Secret Information
...Show More Authors

In any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Some Results on Fuzzy ω-Covering Dimension Function in Fuzzy Topological Space
...Show More Authors

     The purpose of this paper is to study a new class of fuzzy covering dimension functions, called fuzzy

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The Imam Al-Zayla'i's Tracks on Imam Mardini   In his Banner Monument
...Show More Authors

The study of these selected traces shows that what Imam Mardini did on Imam al-Zayla'i and enabled him to graduate the hadiths of the book (guidance and conclusions) as well as in choosing the novel closest to Murad the work and not as described by al-Zayla'i .... never deserves descriptions.

View Publication Preview PDF
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
New Research Trends in Designing E-Government Architecture Based on Blockchain Technology
...Show More Authors

Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated.  This work studies and analyzes some research trends focused on blockchain

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Radioelectronics And Communications Systems
Optical CDMA Coded STBC Based on Chaotic Technique in FSO Communication Systems
...Show More Authors

Free-Space Optical (FSO) can provide high-speed communications when the effect of turbulence is not serious. However, Space-Time-Block-Code (STBC) is a good candidate to mitigate this seriousness. This paper proposes a hybrid of an Optical Code Division Multiple Access (OCDMA) and STBC in FSO communication for last mile solutions, where access to remote areas is complicated. The main weakness effecting a FSO link is the atmospheric turbulence. The feasibility of employing STBC in OCDMA is to mitigate these effects. The current work evaluates the Bit-Error-Rate (BER) performance of OCDMA operating under the scintillation effect, where this effect can be described by the gamma-gamma model. The most obvious finding to emerge from the analysis

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Some Results on Fixed Points for Monotone Inward Mappings in Geodesic Spaces
...Show More Authors

In this article, the partially ordered relation is constructed in geodesic spaces by betweeness property, A monotone sequence is generated in the domain of monotone inward mapping,  a monotone inward contraction mapping is a  monotone Caristi inward mapping is proved, the general fixed points for such mapping is discussed and A mutlivalued version of these results is also introduced.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Dec 15 2017
Journal Name
Journal Of The College Of Education For Women
Identity in Sonia Sanchez's Poem "right on: white america" :A Stylistic Study
...Show More Authors

Language is an important means through which one can construct one's social world. Accordingly, the way we view ourselves and the world is basically formed by language use whereby identities, relations, and values are constructed and maintained. Most discourse analysts consider narrative not only the locus of construction and enactment of identity, but also a distinguished genre for its analysis.The present study is concerned with how identity can poetically be informed, hence exploring the way black poets use language when reflecting their identity and culture. The poem, right on: white america by the black American poetess Sonia Sanchez, is chosen to be analyzed based on Simpson's stylistic model (2004). In this model, the ana

... Show More
View Publication Preview PDF