The current study was designed to investigate the presence of aflatoxin M1 in 25 samples of pasteurized canned milk which collected randomly from some Iraqi local markets using ELISA technique. Aflatoxin M1 was present in 21 samples, the concentration of aflatoxin M1 ranged from (0.25-50 ppb). UV radiation (365nm wave length) was used for detoxification of aflatoxin M1 (sample with highest concentration /50 ppb of aflatoxin M1 in two different volumes ((25 & 50 ml)) for two different time (15 & 30 min) and 30, 60, 90 cm distance between lamp and milk layer were used for this purpose). Results showed that distance between lamp and milk layer was the most effective parameter in reduction of aflatoxin M1, and whenever the distance increase the effect also increase
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe research aims to apply one of the techniques of management accounting, which is the technique of the quality function deployment on the men's leather shoe product Model (79043) in the General Company for Textile and Leather Industries by determining the basic requirements of the customer and then designing the characteristics and specifications of the product according to the preferences of the customer in order to respond to the customer's voice in agreement With the characteristics and technical characteristics of the product, taking into account the products of the competing companies to achieve the maximum customer satisfaction, the highest quality and the lowest costs. Hence, the importance of research has emerged, which indicat
... Show MoreIn the present work the performance of semifluidized bed adsorber was evaluated for removal of phenolic compound from wastewater using commercial activated carbon as adsorbent. P-chlorophenol (4-Chlorophenol) and o-cresol (2-methylphenol) was selected as a phenolic compound for that purpose. The phenols percent removal, in term of breakthrough curves were studied as affected by hydrodynamics limitations which include minimum and maximum semifluidization velocities and packed bed formation in the column by varying various parameters such as inlet liquid superficial velocity (from Uminsf to 8Uminsf m/s), and retaining grid (sometimes referred to as adsorbent loading) to initial static bed height ratio (from 3-4.5). In
... Show MoreThe question of estimation took a great interest in some engineering, statistical applications, various applied, human sciences, the methods provided by it helped to identify and accurately the many random processes.
In this paper, methods were used through which the reliability function, risk function, and estimation of the distribution parameters were used, and the methods are (Moment Method, Maximum Likelihood Method), where an experimental study was conducted using a simulation method for the purpose of comparing the methods to show which of these methods are competent in practical application This is based on the observations generated from the Rayleigh logarithmic distribution (RL) with sample sizes
... Show MoreGas sensors are essential for detecting noxious gases that have a detrimental effect on people's health and welfare. Carbon quantum dots (CQDs) are the fundamental component of gas detectors. CQDs and graphene (Gr) were prepared using the electrochemical method. The gas sensitivity of these materials was evaluated at different temperatures (150, 200, 250 °C) to assess their effectiveness. Subsequently, experiments were conducted at different temperatures to ascertain that the combination of CQDs and Gr, with various percentages of Gr and CQDs, exhibited superior gas sensitization properties compared to CQDs alone. This was evaluated based on criteria such as sensitivity, recovery time, and reaction time. Interestingly, the combination was
... Show MoreThe clayey soils have the capability to swell and shrink with the variation in moisture content. Soil stabilization is a well-known technique, which is implemented to improve the geotechnical properties of soils. The massive quantities of waste materials are resulting from modern industry methods create disposal hazards in addition to environmental problems. The steel industry has a waste that can be used with low strength and weak engineering properties soils. This study is carried out to evaluate the effect of steel slag (SS) as a by-product of the geotechnical properties of clayey soil. A series of laboratory tests were conducted on natural and stabilized soils. SS was added by 0, 2.5, 5, 10, 15, and 20% to the soil.
... Show MoreInstitutions and companies are looking to reduce spending on buildings and services according to scientific methods, provided they reach the same purpose but at a lower cost. On this basis, this paper proposes a model to measure and reduce maintenance costs in one of the public sector institutions in Iraq by using performance indicators that fit the nature of the work of this institution and the available data. The paper relied on studying the nature of the institution’s work in the maintenance field and looking at the type of data available to know the type and number of appropriate indicators to create the model. Maintenance data were collected for the previous six years by reviewing the maintenance and financial dep
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show More