The aim of the current research is to study the effect of adding green tea to the edible film prepared from the whey protein isolate on the effectiveness of microorganisms and evaluating the of antimicrobial effectiveness of these films on Iraqi soft cheese packaging during the nine days of storage as an alternative to commercial packaging. At the beginning of the study, the minimum inhibitory concentration was measured by calculate the diameter of the zone of inhibition on growth of the bacteria and it's included the group of Gram negative bacteria (Escherichia coli, Salmonella spp, Pseudomonas Aeruginosa) and the group of Gram positive bacteria (Staphylococcus Aureus, Bacillus spp) and a yeast (Candida Albican). Where the diameter of the halos formed (11, 20, 10, 7, 14, 16) respectively. The changes in the microbial numbers were also observed during the storage period. In this study, two treatments of Iraqi soft cheese were used. The first treatment of the cheese was uncoated as a control treatment (T1 treatment) & the second treatment of the cheese (T2 treatment) was coated with the film of the whey protein supported by the green tea extract.The results of the experiments were conducted to estimate the numbers of microorganisms indicate that there are significant differences in the last days of storage Between the two treatments and at a significant level of 0.05 in both the total count bacteria and total coliform bacteria and staphylococcus number, The numbers of bacteria have decreased about 1-2 Logarithmic CFU/gm, and approximately 2-3 Logarithmic CFU/gm in relation to the number of staphylococcus aureus. It was also found that there were significant differences at a significant level of 0.05 Between the T2 treatment of Iraqi soft cheese models compared to the T2 treatment for the number of sychrotrophic bacteria and the reduction in numbers was approximately 2-3 Logarithmic CFU/gm, and the number of molds and yeast decreased by 0.5-1.5 Logarithmic CFU/gm, The treatment of cheese packaging has increased the age of cheese the results of the sensory evaluation of T1 (non-coated cheese) and T2 were improved that the coated cheese was obtained a higher grades during the storage period.
Construction of artificial higher order protein complexes allows sampling of structural architectures and functional features not accessible by classical monomeric proteins. Here, we combine in silico modelling with expanded genetic code facilitated strain promoted azide-alkyne cycloaddition to construct artificial complexes that are structurally integrated protein dimers and demonstrate functional synergy. Using fluorescent proteins sfGFP and Venus as models, homodimers and heterodimers are constructed that switched ON once assembled and display enhanced spectral properties. Symmetrical crosslinks are found to be important for functional enhancement. The determined molecular structure of one artific
To decrease the dependency of producing high octane number gasoline on the catalytic processes in petroleum refineries and to increase the gasoline pool, the effect of adding a suggested formula of composite blending octane number enhancer to motor gasoline composed of a mixture of oxygenated materials (ethanol and ether) and aromatic materials (toluene and xylene) was investigated by design of experiments made by Mini Tab 15 statistical software. The original gasoline before addition of the octane number blending enhancer has a value of (79) research octane number (RON). The design of experiments which study the optimum volumetric percentages of the four variables, ethanol, toluene, and ether and xylene materials leads
... Show MoreThe main purpose of this paper, is to characterize new admissible classes of linear operator in terms of seven-parameter Mittag-Leffler function, and discuss sufficient conditions in order to achieve certain third-order differential subordination and superordination results. In addition, some linked sandwich theorems involving these classes had been obtained.
This paper presents the effect of relativistic and ponderomotive nonlinearity on cross-focusing of two intense laser beams in a collisionless and unmagnetized plasma. It should be noted here that while considering the self-focusing due to relativistic electron mass variation, the electron ponderomotive density depression in the channel may also be important. Therefore/these two nonlinearties may simultaneously affect the self-focusing process. These nonlinearities depend not only on the intensity of one laser but also on the second laser. Therefore, one laser beam affects the dynamics of the second beam and hence the process of cross-focusing takes place. The electric field amplitude of the excited electron plasma wave (EPW) has been cal
... Show MoreThis paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the
... Show MoreMelanoides tuberculata (O. F. Müller, 1774), a freshwater snail native to eastern Mediterranean, eastern Africa, southeast Asia, southern Asia, India, and Malaysia, it is an effective invader and is now nearly globally distributed. This snail has been studied with interest because of its rapidly distributed, and because of being can serve as compatible intermediate host for many of trematodes in the world. We have summarized information from many articles in order to highlight the most important aspects of this invader snail life.
This paper presents a study to investigate the behavior of post-tensioned segmental concrete beams that exposed to high-temperature. The experimental program included fabricating and testing twelve simply supported beams that divided into three groups depending on the number of precasting concrete segments. All specimens were prepared with an identical length of 3150 mm and differed in the number of the incorporated segments of the beam (9, 7, or 5 segments). To simulate the genuine fire disasters, nine out of twelve beams were exposed to a high-temperature flame for one hour. Based on the standard fire curve (ASTM – E119), the temperatures of 300◦C (572◦F), 500◦C (932◦F), and 700◦C (1292◦F) were adopted. Consequently,
... Show MoreIn this work, the switching nonlinear dynamics of a Fabry-Perot etalon are studied. The method used to complete the solution of the differential equations for the nonlinear medium. The Debye relaxation equations solved numerically to predict the behavior of the cavity for modulated input power. The response of the cavity filled with materials of different response time is depicted. For a material with a response time equal to = 50 ns, the cavity switches after about (100 ns). Notice that there is always a finite time delay before the cavity switches. The switch up time is much longer than the cavity build-up time of the corresponding linear cavity which was found to be of the order of a few round-trip ti
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More