A fast moving infrared excess source (G2) which is widely interpreted as a core-less gas and dust cloud approaches Sagittarius A* (Sgr A*) on a presumably elliptical orbit. VLT
Dietary components and changes cause shifts in the gastrointestinal microbial ecology that can play a role in animal health and a wide range of diseases. However, most information about the microbial populations in the gut of horses has not been quantitative. The objective of this study was to characterize the fecal bacterial and its prevalence in healthy horses and diarrheal one in a period from September 2010 to July 2013. Out of 100 Fecal samples of horses (from farms in Al-furusyia club) in Baghdad were examined for microbial differentiation founded eighty percent of the fecal samples isolated from healthy horses. The most common pathogen found were Streptococcus spp. (33.7%), Escherichia coli (20.9%), , and Staphylococcus aureus (9.2
... Show MoreThe functional properties of the defatted powder and protein isolate of germinated mung bean seeds were studied and the estimation of the amino acids was carried out. The results showed a significant increase in the values of the amino acids leucine, lysine, phenylalanine and valine. The results of studying the functional properties of the protein isolate and defatted powder showed that there were significant differences between the sample The defatted and protein isolate, if the water absorption capacity of the defatted mung powder was 2.5% water/gm protein and the water absorption capacity of the protein isolate was 3%ml water/g protein, the fat binding capacity of the defatted powder was 0.3 ml fat/g protein and the isolate The ratio was
... Show MoreJudo has witnessed tremendous developments since its inception until the present day. It has been distinguished by its adaptation to the various challenges it has faced throughout the ages. Judo is one of the sports that have been affected by social, technological and cultural changes. These changes reflect its transformation from the traditional Japanese martial art to a global sport practiced. All over the world, therefore, studying the historical development of judo is important, as it provides valuable insights into the development of martial arts over a century, by studying the origins, principles and techniques of judo for the period (1880 - 1980), and also enables us to gain an understanding A deeper understanding of how the art form
... Show MoreThe Mauddud Formation was one of the important and widespread Lower Cretaceous period formations in Iraq. It has been studied in three wells (EB. 55, EB. 58, and EB. 59) within the East Baghdad Oil Field, Baghdad, central Iraq. 280 thin sections were studied by microscope to determine fauna, the formation composed of limestone and dolomitized limestone in some parts which tends to be marl in some parts, forty species and genus of benthic foraminifera have been identified beside algae and other fossils, three biozones have been identified in the range which is: Orbitolina qatarica range zone (Late Albian), Orbitolina sefini range zone (Late Albian – Early Cenomanian) and Orbitolina concava range zone (Early Cenomanian), The age of
... Show MoreSome new mono isoimides of asymmetrical pyromillitdiimide derived from pyromellitic dianhydride were synthesized and studied by their melting points, FTIR, and 1HNMR spectroscopy and CHN analysis (for some of them) and it was proved that the mechanism of the formation of these isoimides followed, the mechanism suggested by Cotter et al. by using N, N─-dicyclohexylcarbodiimide as dehydrating agent, in spite of the groups attached to the phenyl moiety as mentioned in literatures.
In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreIn this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More