beef and chicken meat were used to get Sarcoplasim, the chicken Sarcoplasim were used to prepare antibody for it after injected in rabbit, the antiserums activity were 1/32 by determined with Immune double diffusion test, the self test refer to abele for some antiserums to detected with beef sarcoplasim, which it mean found same proteins be between beef and chicken meat, which it refer to difficult depended on this immune method to detect for cheat of chicken meat with beef, so the antibody for beef sarcoplasim were removed from serum by immune absorption step to produce specific serum against chicken sarcoplasim that it used in Immune double diffusion test to qualitative detect for cheat beef with 5% chicken meat or more at least, and the Immune diffusion test were used to quantitative determined for cheat in 5-50%, this test were showed linear correlation between cheat percent and zone that it showed in gel, the evaluation test results were showed able to cheat beef by add chicken meat up to 25% with out to feel it, while the Immune diffusion test could to detect cheat in this percent and less.
In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreRock failure during drilling is an important problem to be solved in petroleum technology. one of the most causes of rock failure is shale chemical interaction with drilling fluids. This interaction is changing the shale strength as well as its pore pressure relatively near the wellbore wall. In several oilfields in southern Iraq, drilling through the Tanuma formation is known as the most challenging operation due to its unstable behavior. Understanding the chemical reactions between shale and drilling fluid is determined by examining the features of shale and its behavior with drilling mud. Chemical interactions must be mitigated by the selection of suitable drilling mud with effective chemical additives. This study is describing t
... Show MoreThe disposal of textile effluents to the surface water bodies represents the critical issue especially these effluents can have negative impacts on such bodies due to the presence of dyes in their composition. Biological remediation methods like constructed wetlands are more cost-effective and environmental friendly technique in comparison with traditional methods. The ability of vertical subsurface flow constructed wetlands units for treating of simulated wastewater polluted with Congo red dye has been studied in this work. The units were packed with waterworks sludge bed that either be unplanted or planted with Phragmites australis and Typha domingensis. The efficacy of present units was evaluated by monitoring of DO, Temperature, COD
... Show MoreIf the State attaches great importance to its foreign relations and intends to strengthen them in order to ensure the achievement of the highest national goals and interests. External relations between countries are one of the most prominent features of foreign policy, which depends on a combination of internal and external factors, the modern relations between Tunisia and Tunisia, which goes back to the pre-independence of Tunisia, when Iraq was a supporter of Tunisia's independence from France in the 1940s, Although these relations did not cause any disturbance by the two countries, but they remained weak relations did not develop in all areas except the sports and cultural field, which we will determine the reasons and the pos
... Show MoreAbstract
The decision maker needs to understand the strategic environment to be addressed through different means and methods. It is obvious that there is a difference between the three strategic environments (conflict environment, peace environment, post- peace environment) in terms of inputs and strategies to deal with each one of them. There is an urgent need to understand each pattern separately, analyze its inputs, and identify the factors and variables that affect the continuity of this situation (conflict, peace, post-peace). It is not appropriate to identify treatment without diagnosis of the condition, so it is very important to understand the type of strategic environment to be dealt with it.
... Show MoreEnsuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show More