Barhi dates fruit are one of the most important date palm cultivars which are some of their properties they are mostly eaten and sold at the khalal stage when it has become yellow compared with rutab stage. At this stage the fruit loses its astringency and becomes sweet and best texture, therefore. High moisture content and rapid ripening of Barhi dates shorten their shelf life, as well the Khalal stage lasts for about 4 weeks until the ripening of the fruits begins and transfer to rutab stage. In the present study, Barhi dates packaging in the first by common air - packaging and
second by Modified atmosphere packaging, MAP A (5% O2 + 20% CO2) and MAP B (40%O2+20%CO2) and stored for 30 days at different temperatures 5 and 20 °C, respectively. After 30 days of storage, the fruits were evaluated in terms of the Changes in different Quality indices, such as weight loss, total soluble solids (TSS), texture analysis and organoleptic tests. According to the obtained results, modified atmosphere packaging with (5% O2+ 20% CO2) at 5°C was improve all the physicochemical, textural and organoleptic properties, of the samples, to achieve the lowest weight loss 0.45%gm, TSS 37.35 °Brix compared with before storage was 39°Brix, firmness 9.72N.
The control function of important functions in the system of government for several reasons , perhaps the most important of the magnitude of spending and spending in one of the tools adopted in the implementation of the control function.
Perhaps the most prominent stages of the development budget in terms of setup and use in the budget programs and performance , as specialized literature show its importance in strengthening financial and operationl
... Show MoreThe Current Research Seeks To Identify The Possibility Of Unifying The Private Drinking Stations In The Session In A Single Station In Order To Prevent Pollution. In Order To Achieve The Goal Of The Current Research, The Researcher Followed The Descriptive Survey Approach. The Researcher Identified The Research Community As Working In Institutions Related To Drinking Water Filtering In The Governorate Of Baghdad, And In Order To Collect Data And Information Necessary To Answer The Study's Question (Is It Possible To Supply Private Drinking Stations With One Station?) Researcher Designed A Questionnaire Consisting Of (10) Paragraphs Measuring Aspects Of This Topic, And Applied It To A Sample Of Employees And Workers Amounted To (200) People,
... Show MoreThe aim of the research is to identify the relationship between health anxiety associated with Coronavirus (Covid 19) and its relationship to health behavior among Baghdad University employees, as well as to identify the differences in health anxiety and health behavior according to the variables (gender, occupation, and age). To achieve the objectives of the research, a scale was designed to measure the health anxiety in addition to the adoption of the health behavior scale prepared by (Renner & Schwarzer, 2005). The two scales were applied to a sample of (277) academics and (206) employees, while the number of students was (667). The sample was chosen by electronic application from a number of colleges at Al-Jadiriyah Complex. Afte
... Show MoreEach sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volle
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe Developing economies of countries have witnessed essential changes to words the development of tourism industry in the 21st century . in addition to adopting same of policies and strategies to grow up with the tourism sector to make it one of the important economic sector to compete the tourist cal developments in the wear .
As for the tourism sector in Iraq ,it's still afresh one , has many of elements which can be in vested ,needs a wide strategies of tourist cal in statutes and variety completive services and change of success for the locale and forgin investor ,the essential aim after this research is to prompt the national economic through the tourism industry and making concisen
... Show MoreThe research aims to reach a set of objectives concerning creation a clear vision about conceptual, philosophical and practical dimension of relations, and effects between knowledge management, costumer orientation and competitiveness to construct a framework of a pragmatic model as a solution to research problem and its questions which the main one is about the role of knowledge management and costumer orientation in competitiveness of business organizations. To achieving this goal, it was necessary to make, in priory, a review and discussion to the theoretical dimension of research variables to have a clear vision about constructing hypostatical research model implying a set of hypotheses which, by proving them in companies studied, repr
... Show MoreAccording to the measuring the relationship between organizational loyalty and job satisfaction among staff members at one college in the higher education ministry in Iraq by using exploratory factor analysis methods to extraction the components which have the major effects on the variables related to organizational loyalty and job satisfaction .
The research contains four basic topics، the first section related to methodology and regarding the conceptual framework it is discussed in the second section، and the third section concentrated at the presentation and the analysis Scientific results and practical results are section presented in the fourth.
Atenolol was used with ammonium molybdate to prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between atenolol and ammonium molybdate in an aqueous medium to obtain a dark brown precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.1-3.5 mmol/L for cell A and 0.3-3.5 mmol/L for cell B, and LOD 133.1680 ng/100 µL and 532.6720 ng/100 µL for cell A and cell B respectively with correlation coefficient (r) 0.9910 for cell A and 0.9901 for cell B, RSD% was lower than 1%, (n=8) for the determination of ate
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show More