This study was conducted in the field of the Poultry Research Station of the Department of Animal Production / Department of Agricultural Research / Ministry of Agriculture for the period 4/4/2021 to 16/5/2021, in which 300 one-day-old Ross308 chicks that fed on diets used avocado oil and Chia with percentages 0, 0.2, 0.4, 0.6% respectively, and their mixture consisting of 0.0, 0.1, 0.2, 0.3 each of avocado and Chia oil (50% avocado + 50% Chia oil). The experiment included 4 treatments with 3 replicates for each treatment (10 birds/replicates), in order to study the effect of using avocado and chia oil and their mixture in meat broiler diets on some physiological and microbial characteristics of blood plasma. The results indicate a
... Show MoreThis study was conducted in the plant protection department/ College of Agriculture/ University of Baghdad to evaluate the efficiency of physical agents ozone, ultraviolet radiation, microwave for destroying afla produced in corn seeds. An isolate af A.flavus producing Aflatoxin B1 was obtained from plant protection dept. college of Agric. University of Baghdad. Results showed destroy toxin AFLA B1 the effect of radiation microwave in the media of Japex degree 80 and 100 co 57.14% and 85.71%, respectively, and for 20 sec, compared to the treatment comparison 0.00% as found significant differences were apparent between transactions and the treatment of comparison, as and notes the existence of a significant dif
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More|
This research addressed the cultural factors that are affecting the communicator in international public relations in light of the theory of the cultural relativism. The research aimed to find out the nature of cultural differences between societies and how can for professionals in international public relations understanding the culture of other and communicate with him peacefully. The researcher used qualitative and interpretative methodology. Some of the important results of the research are: The Communities are affected by cultural factors that are composed from values, customs, traditions, prevailing and inherited ethic, languages, religious beliefs, fashion, gender, colors indi |
The research aims to identify the theoretical foundations for measuring and analyzing quality costs and continuous improvement, as well as measuring and analyzing quality costs for the Directorate of Electricity Supply / Middle Euphrates and continuous improvement of the distribution of electrical energy,The problem was represented by the high costs of failure and waste in electrical energy result to the excesses on the network and the missing (lost) energy,Thus, measuring and analyzing quality costs for the distribution of electrical energy and identifying continuous improvement leads to a reduction in missing and an increase in sales, as the research reached many conclusions, the most important of which is the high percentage o
... Show MoreThis study was conducted in the field of the Poultry Research Station of the animal resources Department / office of Agricultural Research / Ministry of Agriculture from the period 4th April to16th May2021.This study was aimed to investigate the effect of using avocado and chia oil and their mixture in broiler diets on the final productive performance and meat cholesterol concentration and measuring meat oxidation indicators after storing it for 60 days. 300 one-day-old (Ross308) chicks were fed on diets that used avocado oil and chia with percentages of 0, 0.2, 0.4, 0.6%, respectively, and their mixture consisting of 0.0, 0.1, 0.2, 0.3 each of avocado and chia oil (50% avocado + 50% chia oil). The experiment included 10 treatments
... Show MoreIn this work laser detection and tracking system (LDTS) is designed and implemented using a fuzzy logic controller (FLC). A 5 mW He-Ne laser system and an array of nine PN photodiodes are used in the detection system. The FLC is simulated using MATLAB package and the result is stored in a lock up table to use it in the real time operation of the system. The results give a good system response in the target detection and tracking in the real time operation.