The aim of this research was to indicate the opinion of the Iraqi consumer awareness of the risks associated with consuming canned food, the questionnaire was included 20 questions for label information, consumer culture, shopping, marketing, awareness and knowledge as a tool to survey the opinions of 300 consumers in Baghdad, the data was analyzed by using percentage, weighted mean, and weight percent, the results obtained showed that the Iraqi consumer need more information, training and guidance programs in food safety handling issue for canned food, especially in analysis of label information and growing of consumer culture for shopping, right marketing, awareness and knowledge.
A laboratory experiment was carried out at the College of Agriculture University of Baghdad in 2017. The aim was to improve the anatomical and physiological traits of broad bean seedling under salt stress by soaking it in salicylic acid. The concentrations of salicylic acid were 0, 10, and 20 mg L-1 and the electrical conductivity levels were 0, 3, and 6 dS m-1. The complete randomized design was used with four replications. The increasing of salicylic acid concentration up to 10 mg L-1 led to increasing the stem cortex thickness, stem vascular bundles thickness, and root cortex thickness significantly by (34.9,36.7,and 55 μm) respectively, while the treatment of 20 mg L-1 led to decreasing these traits by (28.2, 27.8, and 48.1 μm), compa
... Show MoreThis study focuses on CFD analysis in the field of the shell and double concentric tube heat exchanger. A commercial CFD package was used to resolve the flow and temperature fields inside the shell and tubes of the heat exchanger used. Simulations by CFD are performed for the single shell and double concentric tube.
This heat exchanger included 16 tubes and 20 baffles. The shell had a length of 1.18 m and its diameter was 220 mm. Solid Works 2014, ANSYS 15.0 software was used to analyze the fields of flow and temperature inside the shell and the tubes. The RNG k-ε model was used and it provided good results. Coarse and fine meshes were investigated, showing that aspect ratio has no significant effect. 14 million
... Show MoreThis work, introduces some concepts in bitopological spaces, which are nm-j-ω-converges to a subset, nm-j-ω-directed toward a set, nm-j-ω-closed mappings, nm-j-ω-rigid set, and nm-j-ω-continuous mappings. The mainline idea in this paper is nm-j-ω-perfect mappings in bitopological spaces such that n = 1,2 and m =1,2 n ≠ m. Characterizations concerning these concepts and several theorems are studied, where j = q , δ, a , pre, b, b.
In this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.
One-third of the total waste generated in the world is construction and demolition waste. Reducing the life cycle of building materials includes increasing their recycling and reuse by using recycled aggregates. By preventing, the need to open new aggregate quarries and reducing the amount of construction waste dumped into landfills, the use of recycled concrete aggregate in drum compacted concrete protects the environment. Four samples of PRCC were prepared for testing (compressive strength, tensile strength, flexural strength, density, water absorption, porosity) as the reference mix and (10, 15, and 20%) of fine recycled concrete aggregate as a partial replacement for fine natural aggregate by volume. The mix is designed according to
... Show MoreThe Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst
... Show MoreDensity Functional Theory (DFT) method of the type (B3LYP) and a Gaussian basis set (6-311G) were applied for calculating the vibration frequencies and absorption intensities for normal coordinates (3N-6) at the equilibrium geometry of the Di and Tetra-rings layer (6, 0) zigzag single wall carbon nanotubes (SWCNTs) by using Gaussian-09 program. Both were found to have the same symmetry of D6d point group with C--C bond alternation in all tube rings (for axial bonds, which are the vertical C--Ca bonds in rings layer and for circumferential bonds C—Cc in the outer and mid rings bonds). Assignments of the modes of vibration IR active and inactive vibration frequ
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show More