Yersinia enterocolitica has ranked a third among the pathogens that most frequently cause gastrointestinal disorders transmitted to humans through food materials, especially contaminated meats. The meat infected with Yersinia enterocolitica had no change in apparent texture or smell. The aim of this research is to survey the frequency of Y. enterocolitica in ovine meat, compare their ratio of infection between the season, To carry out this study (125) samples of local ovine meat were collected by random sampling from the middle region of Iraq. The samples were divided into two groups steak and mince, then many microbiological tests (culture, & staining, biochemical Tests Api 20E, Vitik 2 and species-specific PCR amplicon for 16S RNA gene) were performed.(16%) of all of the studied Ovine meats sample were contaminated with Y. enterocolitica. The analysis of results with chi-square tests showed that there was a significant variation in the isolation percentage between seasons, also minced ovine meat was more contaminated than steak.
Praise be to God, prayer and peace be upon the Messenger of Allah and after:
The science of interpretation is related to the book of God Almighty; it is considered one of the most honorable sciences. It started with a long time ago. In the early days of Islam, the area of the Islamic state expanded. The people entered the religion of Allah in groups. In the language, and people do not know more than the meanings of the Koran was the need to write in this scie234nce is strong, and perhaps the first of the thousand in the (meanings of the Koran) Abu Ubaida in his book (metaphor of the Koran), Abu Ubaida was affected by his specialization in Arabic science, Prominent on his book.
The second section wa
... Show More
Research summary
Backbiting pronouns have gained great importance in contemporary textual linguistic studies, as they play a coordinating function in the text and link its parts.
Interpreters did not overlook the role of backbiting pronouns in achieving the function of consistency and coherence in the Qur’anic text, as they referred to this, including Ibn Ashour, who had many analytical practices related to referral issues and their complexities. The Qur'anic reference to the pronouns of backbiting, so the researcher traced these phenomena and their evidence in the Holy Qur'an, aiming to clarify their role in enriching the significance and in the coherence and harmony
... Show MoreIn this work an approach has been developed to investigate the influence of surface roughness on thermohydrodynamic performance in aligned and misaligned journal bearings by considering an average flow model and deriving the shear flow factor for various roughness configurations, similar to the pressure flow factor. An average Reynolds equation for rough surfaces is defined in term of pressure and shear flow factors, which can be obtained by numerical flow simulation, though the use of measured or numerically generated rough surfaces. Reynolds, heat conduction and energy equations are solved simultaneously by using a suitable numerical technique (Finite Difference Method) to obtain the pressure and temperature di
... Show MoreIn this study, the sonochemical degradation of phenol in water was investigated using two types of ultrasonic wave generators; 20 kHz ultrasonic processor and 40 kHz ultrasonic cleaner bath. Mineralization rates were determined as a function of phenol concentration, contact time, pH, power density, and type of ultrasonic generator. Results revealed that sonochemical degradation of the phenol conversion was enhanced at increased applied power densities and acidic conditions. At 10 mg/L initial concentration of phenol, pH 7, and applied power density of 3000 W/L, the maximum removal efficiency of phenol was 93% using ultrasonic processor at 2h contact time. Whereby, it was 87% using and ultrasonic cleaner bath at 16h contact time and 150 W
... Show MoreThe problem of the paper focused on the role of the learning organization in the crisis management strategy, and the extent of the actual interest in both the learning organization and the crisis management and aimed at diagnosing and analyzing that and surrounding questions. The Statistical Package for the Social Sciences (SPSS) program was used to calculate the results and the correlation coefficient between the two main variables. The methodology was descriptive and analytical. The case study was followed by a questionnaire that was distributed to a sample of 31 teachers. The paper adopted a seven-dimensional model of systemic thinking that encourages questioning, empowerment, provision of advanced technologies, and strategic lea
... Show MoreThis study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV
... Show MoreThis study aims to identfy virtual plastic art exhibitions in light of the challenges of the Corona pandemic. It used a descriptive analytical method through several questions and examining future challenges via the Internet in publishing virtual plastic art exhibitions in many parts of the world in light of the challenges of the Corona pandemic. For that, it used Arab and foreign references.
The study reached many results, the most important of which are: The detection of virtual reality applications and their impact on the plastic arts exhibitions sector. Besides, the insights gained from future art gallery research with VR technology could provide direct and practical value for this sector. By using a technology, similar to the “
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More