A total of 20 raw milk samples were used as the fouling agent for evaluating the bacteriological effectiveness of cleaning and sanitizing of domestic milking equipment by using ozonated water at 0.5 ppm comparing to the warm water at 55! for 5 minutes respectively. The mean values of total aerobic bacteria, Coliform and E.coli that present on the plastic and stainless-steel containers after using the raw milk as fouling agent were 3.4×10-6 , 6.7x10-5 and 5.8×10-3 cfu/cm2 respectively , after cleaning the stainless steel containers by the ozonated water the mean values of total aerobic bacterial counts, Coliforms and E.coli bacteria were reduced to 1.2×10-6, 4.7×10-5 and 3.3×10-3 CFU/cm2 respectively. while after cleaning by the warm water were only reduced to 2.3x10-6, 2.7×10-5and 2.8×10-3 CFU/cm2 respectively . The mean values of total aerobic bacteria, coliform ,and E.coli counts/ cm2 after cleaning the plastic containers by the ozonated water were reduced to 1.4×10-6, 1.8×10-5 and 2.4×10- 3 CFU/cm2 respectively, while the mean values after cleaning by the warm water were reduced to 1.1×10-6, 1.7×10-5 and 2.3×10- 3 CFU/cm2 respectively .The mean values of total aerobic, Coliforms and E.coli bacteria after using both the Ozonating and warm water for both stainless steel and plastic containers were reduced to 4.2x10-5, 2.1x10-3, 1.6x10-2, 2.2x10-5, 5.1x10-3 and 1.4x10-2 CFU/cm2 respectively. The results of the current study showed that the independed either treatment by the ozonated or warm water not effectively reduced the number of the quality control bacteria because such reduction in bacterial population could not be enough to guarantee the safety of the home dairy containers, while the combined both treatments had a significant reduction in the population of the quality control bacteria. The effectiveness of cleaning and sanitization by the ozonated and warm water process may be depending on the initial count contaminated bacteria of raw milk, exposure time, kind of containers and both concentration of ozone and the heating temperature.
: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreThis study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreA new two-way nesting technique is presented for a multiple nested-grid ocean modelling system. The new technique uses explicit center finite difference and leapfrog schemes to exchange information between the different subcomponents of the nested-grid system. The performance of the different nesting techniques is compared, using two independent nested-grid modelling systems. In this paper, a new nesting algorithm is described and some preliminary results are demonstrated. The validity of the nesting method is shown in some problems for the depth averaged of 2D linear shallow water equation.
Well-dispersed Cu2FeSnSe4 (CFTSe) nanoparticles were first synthesized using the hot-injection method. The structure and phase purity of as-synthesized CFTSe nanoparticles were examined by X-ray diffraction (XRD) and Raman spectroscopy. Their morphological properties were characterized by scanning electron microscopy (SEM) and transmission electron microscopy (TEM). The average particle sizes of the nanoparticles were about 7-10 nm. The band gap of the as-synthesized CFTS nanoparticles was determined to be about 1.15 eV by ultraviolet-visible (UV-Vis) spectrophotometry. Photoelectrochemical characteristics of CFTSe nanoparticles were also studied, which indicated their potential application in solar energy water splitting.
Water saturation is the most significant characteristic for reservoir characterization in order to assess oil reserves; this paper reviewed the concepts and applications of both classic and new approaches to determine water saturation. so, this work guides the reader to realize and distinguish between various strategies to obtain an appropriate water saturation value from electrical logging in both resistivity and dielectric has been studied, and the most well-known models in clean and shaly formation have been demonstrated. The Nuclear Magnetic Resonance in conventional and nonconventional reservoirs has been reviewed and understood as the major feature of this approach to estimate Water Saturation based on T2 distribution. Artific
... Show MoreApple slice grading is useful in post-harvest operations for sorting, grading, packaging, labeling, processing, storage, transportation, and meeting market demand and consumer preferences. Proper grading of apple slices can help ensure the quality, safety, and marketability of the final products, contributing to the post-harvest operations of the overall success of the apple industry. The article aims to create a convolutional neural network (CNN) model to classify images of apple slices after immersing them in atmospheric plasma at two different pressures (1 and 5 atm) and two different immersion times (3 and again 6 min) once and in filtered water based on the hardness of the slices usin
The research aims to derive the efficient industrial plans for Al – shaheed public company under risk by using Target MOTAD as a linear alternative model for the quadratic programming models.
The results showed that there had been a sort of (trade- off) between risk and the expected gross margins. And if the studied company strives to get high gross margin, it should tolerate risk and vice versa. So the management of Al- Shaheed Company to be invited to apply the suitable procedures in the production process, in order to get efficient plans that improves it's performance .