The current study was conducted on 504(Ros-308) broiler chicks during the period 28/9/2017-9/11/2018to determine the effect of heat shock in early age and additives such as ginseng in three levels on birds weight and feedconsumption. Results showed that the exposure to high temperature (38-400C) lead to significant decrease (p≤≤≤≤≤0.05 (inaverage body weight at7 day of age and significant decrease in body weight in birds expousured to high temperature inthe periods 2, 4 and 6 hours compared with control (Table 1). Significant decrease in live body weight when exposure to2hr compared with 6hr namely (138.54) and (144.21), respectively while no significant difference between 2 and 4h.Results showed no significant effect in body weight in control group compared with the group that fed on diet containginseng extract with or without vitamins and minerals. Interaction between exposure time and ginseng extract on bodygain weight all ages, the height body gain was noticed in P0G2 at 24days at age (514.78 gm). While, the lowest value wasin P6G0 (275.78) Accumulative body gain was differed significantly P2G2(2514.22 gm) compared with P6G0(2054.45 gm)
The increase the rates of natural growth, urbanization and continuous migration, this has generated constant pressure and, as a result, the capital city of Baghdad faces a number of challenges related to its urban environment, including the challenge of acquiring real estate.
and this research examines the impact of these holdings, representing the main base from which the various projects originate Urban in all areas (economic, social, and recreational).
this leads us to the research problem of the obstacles that arise during the process of acquiring real estate to carry out development projects, and to achieve the objectives of research, namely (work to create a regulatory methodology
... Show MoreThis study aimed to review the aesthetic miracle in the story of Yusuf, peace be upon him, with the Al-Azeez’s wife, using the historical, descriptive and analytical approaches. The study sample was determined in the verses (30-34) of the Holy Quran. The study found that the beauty of Yusuf, peace be upon him, went beyond the four stages and steps of the aesthetic judgment that Feldman set, in which Yusuf’s beauty is nothing but a divine miracle that cannot be described, analyzed, and interpreted. Also despite the various concepts of beauty dealt with by ancient Greek philosophers such as the Pythagoreans, Socrates, Plato and Aristotle; and modern philosophers such as Descartes, Diderot, Kant, Hegel, and Schopenhauer are embodied in
... Show MoreThe concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreSome of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
We study in this paper the composition operator of induced by the function ?(z)=sz+t where , and We characterize the normal composition operator C? on Hardy space H2 and other related classes of operators. In addition to that we study the essential normality of C? and give some other partial results which are new to the best of our knowledge.
This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
Cryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p
... Show More