Modelling of inactivation of microorganisms in the process of sterilization using high pressure supercritical fluids
...Show More Authors
By- products of corn starch industry were used to prepare media for propagation the lactic acid bacteria as a natural auxotroph. The by- products used were the corn steep water (S) and gluten extract (G) after a proper treatment to get them ready for media preparation. The results showed that it was possible to replace the peptone and meat extract by gluten extract in MRS medium. The growth was approximately similar to that obtained in standard MRS media. Corn steep water (S) was used as well and the growth enhanced by including Tween – 80 at 1% level. The later media named MZ, which was superior for growing standard and local strains and starters. The MZ medium modified by adding acetate and glacial acetic acid similarly to
... Show MoreIt is well known that drilling fluid is a key parameter for optimizing drilling operations, cleaning the hole, and managing the rig hydraulics and margins of surge and swab pressures. Although the experimental works represent valid and reliable results, they are expensive and time consuming. In contrast, continuous and regular determination of the rheological fluid properties can perform its essential functions during good construction. The aim of this study is to develop empirical models to estimate the drilling mud rheological properties of water-based fluids with less need for lab measurements. This study provides two predictive techniques, multiple regression analysis and artificial neural networks, to determine the rheological
... Show MoreThe importance of the study stems from the fact that Iraq’s economy is facing a housing crisis, especially in the Iraqi capital, Baghdad, great demographic pressure due to pronounced population growth over the past two decades. The Central Bank of Iraq undertakes several initiatives represented in granting real estate loans, mainly through the Real Estate Bank at very low interest, and in the last two years, the interest has become zero. The purpose of the study is to analyze the fiscal implications of the Iraqi central bank’s real estate initiatives, as well as its real impact on the spatial dimension of the Iraqi governorates through new housing in those governorates. Using data mainly from the Central Bank of Iraq’s bulleti
... Show MoreThe physical and elastic characteristics of rocks determine rock strengths in general. Rock strength is frequently assessed using porosity well logs such as neutron and sonic logs. The essential criteria for estimating rock mechanic parameters in petroleum engineering research are uniaxial compressive strength and elastic modulus. Indirect estimation using well-log data is necessary to measure these variables. This study attempts to create a single regression model that can accurately forecast rock mechanic characteristics for the Harth Carbonate Formation in the Fauqi oil field. According to the findings of this study, petrophysical parameters are reliable indexes for determining rock mechanical properties having good performance p
... Show MoreThe behaviour of certain dynamical nonlinear systems are described in term as chaos, i.e., systems' variables change with the time, displaying very sensitivity to initial conditions of chaotic dynamics. In this paper, we study archetype systems of ordinary differential equations in two-dimensional phase spaces of the Rössler model. A system displays continuous time chaos and is explained by three coupled nonlinear differential equations. We study its characteristics and determine the control parameters that lead to different behavior of the system output, periodic, quasi-periodic and chaos. The time series, attractor, Fast Fourier Transformation and bifurcation diagram for different values have been described.
With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreBackground: e cerebellum is divided into two hemispheres and contains a narrow midline zone called thevermis. A set of large folds are conventionally used to divide the overall structure into ten smaller "lobules". evermis receives fibres from the trunk and proximal portions of limbs, But the question is that does the cerebellum have the same measurementvalues in males and females of the same age?Material and method: e present study used 80 sectional brain MRI images (40: males, 40: females); 35-50 years old as indices of size for thevermian structures of the Cerebellum. is middle age group was taken because as known generally it could be neither an age of growth as inthe young nor of atrophy as in old individuals. e aim rega
... Show More