The results shows existence of metals such as copper, iron, Cadmium, lead and zinc in most of examined samples , the highest concentration are up to (2.26, 40.82, 282.5, 31.02, 19.26, 4.34) Part per million) ppm) in pasta hot (Zer brand), Indomie with chicken, granule (Zer brand), brand (Zer brand), and rice (mahmood brand) respectively, with presence nickel in spaghetti( Zer brand), granule, Zer brand with concentration reached to 4.34 ppm and 1.06 ppm respectively.
The results of cereals group and its products show that two kinds of fungi, Aspergillus spp. and Penicillin spp. were found in rice (Mahmood brand) with numbers got to 1.5×103 Colony Forming Unit/ gram (c.f.u./g),while Bacillus cereus and Staphylococcus aureus were isolated from Spaghetti (Zer brand) with numbers got to 2×102, and 4×102, c.f.u/g ,and Clostridium Perfringens and Escherichia coli were from pasta (Zer brand),with numbers got to 1×10, 6×102 c.f.u/g, it was noticed that bulgur (Zer brand) was polluted with penicillium spp., and the number of yeasts and molds got to 1.5×103 c.f.u./g.
It was found that Escherichia coil and Staphylococcus aureus are found in pasta (Zer brand) with numbers got to 1×10, and 6×102 g/c.f.u, in addition to Aspergillus spp., the numbers of Bacillus subtitus and Escherichia coil, which polluted granule(Zer brand) 1.1×10 and 5×102 c.f.u/g as well as Aspergillus spp.The number of yeasts and molds in Indomie with chicken got to 1.1×102 c.f.u/g and fungus, Aspergillus spp., was also isolated from it.
يتناول البحث مسؤولية منتسبي قوى الامن الداخلي عن اعمالهم الشخصية
In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe
... Show Moreبعد الانحرافات التي شابت تنفيذ المسؤولية عن الحماية في ليبيا عام 2011، دعت البرازيل الى اتباع التسلسل في تنفيذ الركائز الثلاث للمسؤولية عن الحماية عند معالجة الازمات الانسانية ذات الصلة بجرائم الحرب والجرائم ضد الانسانية وجريمة الابادة الجماعية وجريمة التطهير العرقي، في حين دعا الامين العام للامم المتحدة في العديد من تقاريره السنوية بشأن المسؤولية عن الحماية بانه لاينبغي التقيد بالتسلسل واعتبر ان الركائز ا
... Show Moreواقع العلاقات التركية الالمانية والبحث عن نموذج للاستقرار
The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
This article aims to explore the importance of estimating the a semiparametric regression function ,where we suggest a new estimator beside the other combined estimators and then we make a comparison among them by using simulation technique . Through the simulation results we find that the suggest estimator is the best with the first and second models ,wherealse for the third model we find Burman and Chaudhuri (B&C) is best.
During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.