beef and chicken meat were used to get Sarcoplasim, the chicken Sarcoplasim were used to prepare antibody for it after injected in rabbit, the antiserums activity were 1/32 by determined with Immune double diffusion test, the self test refer to abele for some antiserums to detected with beef sarcoplasim, which it mean found same proteins be between beef and chicken meat, which it refer to difficult depended on this immune method to detect for cheat of chicken meat with beef, so the antibody for beef sarcoplasim were removed from serum by immune absorption step to produce specific serum against chicken sarcoplasim that it used in Immune double diffusion test to qualitative detect for cheat beef with 5% chicken meat or more at least, and the Immune diffusion test were used to quantitative determined for cheat in 5-50%, this test were showed linear correlation between cheat percent and zone that it showed in gel, the evaluation test results were showed able to cheat beef by add chicken meat up to 25% with out to feel it, while the Immune diffusion test could to detect cheat in this percent and less.
Most of the water pollutants with dyes are leftovers from industries, including textiles, wool and others. There are many ways to remove dyes such as sorption, oxidation, coagulation, filtration, and biodegradation, Chlorination, ozonation, chemical precipitation, adsorption, electrochemical processes, membrane approaches, and biological treatment are among the most widely used technologies for removing colors from wastewater. Dyes are divided into two types: natural dyes and synthetic dyes.
Background: Prosthodontists estimated the parallelism of the occlusal plane to different anatomical landmarks, which was somewhat arbitrary and depended mainly on their vision. The aim of this research was to assess the degree of accuracy of prosthodontists in determining the parallelism of two lines. This research was aimed to assess which technique would be more accurate for the prosthodontist to distinguish parallelism; the comparison of the occlusal plane with the interpupillary line or with the inferior border of the earlobes. Materials and methods: Twenty eight prosthodontic specialists were included in this research. Illustrations of two lines with different tilts were presented to the participants to distinguish whether parallel or
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThe study aimed to know the effect of the use alcoholic ethanol extraction of Boswellia Carterii In prolonging the period of preservation cooled ground meat in 4C for 6 days, it has been mixing ground meat with 150,300,450 mg/ml of alcoholic extract Consecutive, Where (0 was the control sample), All samples were stored separately for 0 , 3 , 6 days in Refrigerator temperature 4 C, Conducted by some microbial tests, Results have shown that mixing the ground meat with Boswellia Carterii extraction Led to prolong the storage of meat for 6 days at 4 C .and the Best result came when adding alcoholic ethanol extract of Boswellia Carterii by 450mg/ml Which Equal 0.9 g ,that reducing microbial load more higher than 150&300 mg/ml. All of thes
... Show MoreAbstract:
In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the
... Show MoreDiesel engine oil was subjected to thermal oxidization (TO) for six periods of time (0 h, 24 h, 48 h, 72 h, 96 h, and 120 h) and was subsequently characterized by terahertz time domain spectroscopy (THz-TDS). The THz refractive index generally increased with oxidation time. The measurement method illustrated the potential of THz-TDS when a fixed setup with a single cuvette is used. A future miniaturized setup installed in an engine would be an example of a fixed setup. For the refractive index, there were highly significant differences among the oxidation times across most of the 0.3–1.7 THz range.
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreIn this study, different methods were used for estimating location parameter and scale parameter for extreme value distribution, such as maximum likelihood estimation (MLE) , method of moment estimation (ME),and approximation estimators based on percentiles which is called white method in estimation, as the extreme value distribution is one of exponential distributions. Least squares estimation (OLS) was used, weighted least squares estimation (WLS), ridge regression estimation (Rig), and adjusted ridge regression estimation (ARig) were used. Two parameters for expected value to the percentile as estimation for distribution f
... Show MoreThe general crisis of research methods in the social sciences
Research methodology: philosophy and techniques, founded by philosophers and applied by scientists, and no accurate application of techniques except with a deep understanding of philosophy, as a prerequisite. This fact is almost completely absent from the Iraqi and Arab academic mentality. This constituted one of the dimensions of the double crisis - theoretical and applied - of research methods in the social sciences. As first, there is no philosophy of science, neither as an independent material nor as an introductory subject, but not even an oral confirmation. Secondly, the advancement of quantitative research methods are presented without a background philosophy, as sol
The fatty acids in the embryo's liver at ages (7, 11, 14 and 19) days incubation, small chicken aged (14) days after hatching and adult were analyzed, and found (5) fatty acids, the highest concentration of fatty acid in the adult of domesticated chicken and lowest concentration in small chicken age (14) days after hatching. Statistically, there were high significant differences at the probability level (P≤0.001) between all ages together, and the highest concentrations of Oleic acid (C18:1) and Linoleic acid (C18:2) were in embryo age (7) days incubation, while in embryo age (11) days incubation Stearic acid (C18:0) and α-Linolenic acid (C18:3) were higher concentration and Palmitic acid (C16:0) was the highest concentration in the adul
... Show More