This study was aime to investigate the effect of addition different concentration of celery leaves to white soft cheese ,Treated cheese between 2018-2019, ,The finely Celery (Apium graveolens) leaves were adding to crude white cheese after texturizing in three leveles included (A,B,C) in addition of control antimicrobial activity of celery treated cheese against total account bacteria and coliform bacteria was estimated during (0, 5, 10, 15, 20) days. The results were shown that the higher concentration of celery in treated cheese, had a lower concentration of protein, lipid and ash content ( 16.81,15.13 and 4.30% respectively, but it had a higher moisture content 59.50%.also the total bacteria counts were decreasing significantly (0.05 P)with accumulative of cheese during astorage periods, it was reached to 1.3x105 , 9.5x103, 9x103, 7.62x103 , 1.05x104 (cfu/g) respectively comparing with control samples,the number of coliform bacterial in celery treated cheese, at concentrations 15% was achieved significant difference comparing with other samples ( 8x103,10.2x104, 9.7x104 , 8.9x105, 9.5x107( log cfu/g ) respectively.
In this work, the finite element analysis of moving coordinates has been used to study the thermal behavior of the tissue subjected to both continuous wave and pulsed CO2 laser. The results are compared with previously published data, and a good agreement has been found, which verifies the implemented theory. Some conclusions are obtained; As pulse width decreases, or repetition rate increases, or fluence increases then the char depth is decreased which can be explained by an increase in induced energy or its rate, which increases the ablation rate, leading to a decrease in char depth. Thus: An increase in the fluence or decreasing pulse width or increasing repetition rate will increase ablation rate, which will increase the depth of cut
... Show MoreThis study was conducted to investigate phytoplasma causing a virescence disease on Arabic jasmine Jasminum sambac based on microscopy and molecular approaches. Samples were collected from symptomatic Arabic jasmine plants grown in nurseries in Baghdad-Iraq. Specimens from infected plants were prepared and Dienes stained for light microscopy examination. Phytoplasma were detected in infected plants by polymerase chain reaction (PCR) using P1/P7 and SecAfor1/SecArev3 Candidatus Phytoplasma specific primer sets. Light microscopy test showed symptomatic Arabic jasmine plants were phytoplasms infected when phloem tissues were stained with a dark blue color. PCR test confirmed the symptomatic plants were phytoplasms infected when SecAfor1/Sec
... Show MoreThis study was done to determine the concentration of several heavy metals in the water of Al-Saddah agricultural drainage in Al-Saddah District in Babylon Province/Iraq. The concentrations of six heavy metals were measured (Pb, Cd, Cu, Hg, Fe, Zn). It was found that Pb concentration ranged from 0.06 mg/L at St.2 in autumn to 0.13 mg/L at St.2 in winter. Fe concentrations ranged from 0.04 mg/L at St.2 in autumn and winter to 0.41 at St.2 in Summer. Cd concentrations ranged from 0.008 mg/L at St.2 in summer to 0.05 mg/L at St.2 in winter. Cu concentrations ranged from 0.01 mg/L at St.1 in both autumn and winter to 0.63 mg/L at St.2 in winter. Hg concentrations was ranged from 0.002 mg/
In this paper the nuclear structure of some of Si-isotopes namely, 28,32,36,40Si have been studied by calculating the static ground state properties of these isotopes such as charge, proton, neutron and mass densities together with their associated rms radii, neutron skin thicknesses, binding energies, and charge form factors. In performing these investigations, the Skyrme-Hartree-Fock method has been used with different parameterizations; SkM*, S1, S3, SkM, and SkX. The effects of these different parameterizations on the above mentioned properties of the selected isotopes have also been studied so as to specify which of these parameterizations achieves the best agreement between calculated and experimental data. It can be ded
... Show MoreThis paper describes the digital chaotic signal with ship map design. The robust digital implementation eliminates the variation tolerance and electronics noise problems common in analog chaotic circuits. Generation of good non-repeatable and nonpredictable random sequences is of increasing importance in security applications. The use of 1-D chaotic signal to mask useful information and to mask it unrecognizable by the receiver is a field of research in full expansion. The piece-wise 1-D map such as ship map is used for this paper. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. Rec
... Show MoreBackground: Tooth wear is one of the most concerning problems of the current dental practice especially among older subjects. The aim of this study is to determine the severity of tooth wear and its relation with selected salivary variables (salivary pH and vitamin C level) among a group of older adults in Mosul city/Iraq. Materials and methods: All subjects (30 subjects) of both gender tookpart in the current study; sixteen of them were older adults (55-65 years) and compared with fourteen middle-aged adults (30-40 years) at Textile factory in Mosul city/Iraq. Unstimulated salivary samples were collected and salivary pH was immediately measured. Salivary vitamin C level was determined colormetrically. Severity of tooth wear was determined
... Show MoreA Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More