The study was carried out to study the quality of 7 samples of imported frozen chicken that are available in locally markets. These samples were collected from Baghdad markets in June 2010. The results were showed that the all samples were not content the name of company and batch number one the labeling, while the microbial test refer to found contamination in all samples, but it in the limited of Iraqi standers specification for frozen chicken, also note Staphylococcus aureus in all samples, the samples C1 and C2 have Salmonella ohio, while not observe Coliform bacteria in all samples.
The target of this study was to study the natural phytochemical components of the head (capsule) of Cynara scolymus cultivated in Iraq. The head (capsule) of plant was extracted by maceration in70% ethanol for 72 hours, and fractioned by hexane, chloroform and ethyl acetate. Preliminary qualitative phytochemical screening was performed on the ethyl acetate fraction for capsule was revealed the presence of flavonoid and aromatic acids. These were examined by (high -performance liquid chromatography) (HPLC diodarray), (high- performance thin-layer chromatography)(HPTLC).
Flavonoids were isolated by preparative layer chromatography and aromatic acid was isolated by preparative high-
... Show MoreBackground: Non-small cell lung cancer (NSCLC) is caused of 85% of all lung cancers. Among the most important factors for lung tumor growth and proliferation are the tyrosine kinase receptors that coded by the epidermal growth factor recep-tor (EGFR) gene. Activation of EGFR ultimately leads to developing of lung cancer. The present study was undertaken with an objective to detect EGFR mutations in bronchial wash from Iraqi patients with NSCLC before treatment. Methods: DNA was extracted from bronchial wash samples collected from 50 patients with NSCLC by using a Qiamp DNA Mini Kit (Qiagen, Hilden, Germany). Then, EGFR mutations were determined by using real-time RCR combined with two technologies, Amplification Refractory Mutation System (
... Show MoreThe main objective of this paper is to develop and validate flow injection method, a precise, accurate, simple, economic, low cost and specific turbidimetric method for the quantitative determination of mebeverine hydrochloride (MbH) in pharmaceutical preparations. A homemade NAG Dual & Solo (0-180º) analyser which contains two identical detections units (cell 1 and 2) was applied for turbidity measurements. The developed method was optimized for different chemical and physical parameters such as perception reagent concentrations, aqueous salts solutions, flow rate, the intensity of the sources light, sample volume, mixing coil and purge time. The correlation coefficients (r) of the developed method were 0.9980 and 0.9986 for
... Show MoreIn this study, biodiesel was prepared from chicken fat via a transesterification reaction using Mussel shells as a catalyst. Pretreatment of chicken fat was carried out using non‐catalytic esterification to reduce the free fatty acid content from 36.28 to 0.96 mg KOH/g oil using an ethanol/ fat mole ratio equal to 115:1. In the transesterification reaction, the studied variables were methanol: oil mole ratio in the range of (6:1 ‐ 30:1), catalyst loading in the range of (9‐15) wt%, reaction temperature (55‐75 °C), and reaction time (1‐7) h. The heterogeneous alkaline catalyst was greenly synthesized from waste mussel shells throughout a calcin
In this study, biodiesel was prepared from chicken fat via a transesterification reaction using Mussel shells as a catalyst. Pretreatment of chicken fat was carried out using non‐catalytic esterification to reduce the free fatty acid content from 36.28 to 0.96 mg KOH/g oil using an ethanol/ fat mole ratio equal to 115:1. In the transesterification reaction, the studied variables were methanol: oil mole ratio in the range of (6:1 ‐ 30:1), catalyst loading in the range of (9‐15) wt%, reaction temperature (55‐75 °C), and reaction time (1‐7) h. The heterogeneous alkaline catalyst was greenly synthesized from waste mussel shells throughout a calcin
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreThis research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More