This study aimed to evaluate good manufacturing practices in food safety of ten different restaurants in the Al-Karkh area of Baghdad, Iraq. Forty samples collected from were collected from knives, food cutting boards, tables, hands and nails workers in restaurants. In addition. 70 food handlers were selected. Through structured interviews, information on the checklist for Good Manufacturing Practices in Food Safety, Food handlers’ general checklist for good hygiene, and Personal Hygiene Checklist were collected. The overall viable bacterial count before Good Hygiene Practices was significantly higher (P<0.05) than the total bacterial counts after Good Hygiene Practices. The highest viable bacterial counts before Good Hygiene Practices were recorded by food cutting boards (4.03±0.20) log10 cfu/cm2, while (3.90±0.23, 3.51±0.18, 3.00±0.18) log10 cfu/cm2 from tables, hands and nails of workers and knives respectively. Although the results showed a non-significant difference in the viable bacterial counts after Good Hygiene Practices from 10 restaurants collected from the AL-Karkh area. The percentages were (100%) after the training and lecture about Good Hygiene Practices to all checklist points except special basins for washing hands was (90%). However, the results of the General Information of food handlers of Good Hygiene checklist and Personal Hygiene Checklist showed that there were significant differences (P≤0.05) between the self-reported attitudes of food handlers before the one-week training and after Good Hygiene Practices.
An experiment was conducted in pots under field conditions during fall seasons of 2017 and 2018. This study aimed to improve a weak growth of seedlings under salt stress in sorghum. Three factors were studied. 1st factor was three cultivars (Inqath, Rabeh, and Buhoth70). 2nd factor was seed priming (primed and unprimed seed). Seed were primed by soaking for 12 hours in a solution containing 300 + 70 mg L−1 of gibberellic (GA3) and salicylic (SA) acids, respectively. 3rd factor was irrigation with saline water (6, 9 and 12 dS m−1) resulting from dissolving sodium chloride in distilled water in addition to control treatment (distilled water). Randomized complete block design was used with four replications. In both seasons: the results sh
... Show MoreLittle is known about hesitancy to receive the COVID‐19 vaccines. The objectives of this study were (1) to assess the perceptions of healthcare workers (HCWs) and the general population regarding the COVID‐19 vaccines, (2) to evaluate factors influencing the acceptance of vaccination using the health belief model (HBM), and (3) to qualitatively explore the suggested intervention strategies to promote the vaccination.
This was a cross‐sectional study based on electronic survey data that was collected in Iraq during December first‐19th, 2020. The electronic surve
Background: The best material for dental implants is polyetherketoneketone (PEKK). However, this substance is neither osteoinductive nor osteoconductive, preventing direct bone apposition. Modifying the PEKK with bioactive elements like strontium hydroxyapatite is one method to overcome this (Sr-HA). Due to the technique's capacity to provide better control over the coating's properties, RF magnetron sputtering has been found to be a particularly useful technique for deposition.
Materials and methods : With specific sputtering conditions, the RF magnetron technique was employed to provide a homogeneous and thin coating on Polyetherketoneketone substrates.. the coatings were characterized by Contact angle, adhesion test, X-ray dif
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More