The results shows existence of metals such as copper, iron, Cadmium, lead and zinc in most of examined samples , the highest concentration are up to (2.26, 40.82, 282.5, 31.02, 19.26, 4.34) Part per million) ppm) in pasta hot (Zer brand), Indomie with chicken, granule (Zer brand), brand (Zer brand), and rice (mahmood brand) respectively, with presence nickel in spaghetti( Zer brand), granule, Zer brand with concentration reached to 4.34 ppm and 1.06 ppm respectively.
The results of cereals group and its products show that two kinds of fungi, Aspergillus spp. and Penicillin spp. were found in rice (Mahmood brand) with numbers got to 1.5×103 Colony Forming Unit/ gram (c.f.u./g),while Bacillus cereus and Staphylococcus aureus were isolated from Spaghetti (Zer brand) with numbers got to 2×102, and 4×102, c.f.u/g ,and Clostridium Perfringens and Escherichia coli were from pasta (Zer brand),with numbers got to 1×10, 6×102 c.f.u/g, it was noticed that bulgur (Zer brand) was polluted with penicillium spp., and the number of yeasts and molds got to 1.5×103 c.f.u./g.
It was found that Escherichia coil and Staphylococcus aureus are found in pasta (Zer brand) with numbers got to 1×10, and 6×102 g/c.f.u, in addition to Aspergillus spp., the numbers of Bacillus subtitus and Escherichia coil, which polluted granule(Zer brand) 1.1×10 and 5×102 c.f.u/g as well as Aspergillus spp.The number of yeasts and molds in Indomie with chicken got to 1.1×102 c.f.u/g and fungus, Aspergillus spp., was also isolated from it.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreChurning of employees from organizations is a serious problem. Turnover or churn of employees within an organization needs to be solved since it has negative impact on the organization. Manual detection of employee churn is quite difficult, so machine learning (ML) algorithms have been frequently used for employee churn detection as well as employee categorization according to turnover. Using Machine learning, only one study looks into the categorization of employees up to date. A novel multi-criterion decision-making approach (MCDM) coupled with DE-PARETO principle has been proposed to categorize employees. This is referred to as SNEC scheme. An AHP-TOPSIS DE-PARETO PRINCIPLE model (AHPTOPDE) has been designed that uses 2-stage MCDM s
... Show MoreThe virulent genes are the key players in the ability of the bacterium to cause disease. The products of such genes that facilitate the successful colonization and survival of the bacterium in or cause damage to the host are pathogenicity determinants. This study aimed to investigate the prevalence of virulence factors (esp, agg, gelE, CylA) in E. faecalis isolated from diverse human clinical collected in Iraqi patient , as well as to assess their ability to form biofilm and to determine their haemolytic and gelatinase activities. Thirty-two isolates of bacteria Enterococcus faecalis were obtained, including 15 isolates (46.87%) of the urine, 6 isolates (18.75%) for each of the stool and uterine secretions, and 5 isolates (15.62%) of the wo
... Show MoreABSTRACT
The study evaluated the effect of adding quercetin to some characteristics of the sperm of the ram. This study was conducted in the animal field, Department of Animal Production, College of Agricultural Engineering Science, University of Baghdad for the period 5/12/2021 to 20/2/2022. In this experiment, 3 rams were used at the age of 2-2.5 years and weighed 50-55 kg. The semen was collected early in the morning and once a week and the semen was pooled to remove the individual differences. The treatments were divided: quercetin-free control group, treatment T1 (3 µL/mL quercetin), T2 treatment (6 µL/mL quercetin), T3 treatment (9 µL/mL quercetin). The result of the study showed
... Show MoreThe use of Conservatism significant impacts on the financial statements and thus on financial reporting which is produced by these lists so Rate Some of the professionals that the principle of accounting while Rate of others as a constraint, and brought this category based on the uses of this restriction sometimes used the accountant this restriction and especially with the uncertainties in the Sometimes it may collide with some of the cases in which the accountant may be forced to leave in custody as a result of emergence of economic events that gave rise to rights or future commitments should be disclosed.
The emergence in custody mainly was due to the uncertainty and its essence is to report on a
... Show More