beef and chicken meat were used to get Sarcoplasim, the chicken Sarcoplasim were used to prepare antibody for it after injected in rabbit, the antiserums activity were 1/32 by determined with Immune double diffusion test, the self test refer to abele for some antiserums to detected with beef sarcoplasim, which it mean found same proteins be between beef and chicken meat, which it refer to difficult depended on this immune method to detect for cheat of chicken meat with beef, so the antibody for beef sarcoplasim were removed from serum by immune absorption step to produce specific serum against chicken sarcoplasim that it used in Immune double diffusion test to qualitative detect for cheat beef with 5% chicken meat or more at least, and the Immune diffusion test were used to quantitative determined for cheat in 5-50%, this test were showed linear correlation between cheat percent and zone that it showed in gel, the evaluation test results were showed able to cheat beef by add chicken meat up to 25% with out to feel it, while the Immune diffusion test could to detect cheat in this percent and less.
This study was for searching for Cholera Bacteria serotype which causes epidemiology Cholera in the 2007 in a fast method which contains (Rapid Visual Test) (Crystal V.C.) which was used for the first time in Iraq to diagnosis of Cholera Bacteria & compared with the traditional bacteriology method. The Cholera disease is one of the most dangerous epidemiological diseases which lead to death with a percentage of (50 – 70) % in the severe cases for untreated patients . For this purpose, 100 samples of stool from the patients from a (13) hospitals in Baghdad Governorate in the period from August to the end of December. The Cholera was diagnosis in two methods, 1st method was the fast method using the nitrocellulose which is coated with anti-
... Show MoreA qualitative chemical test was performed on functional groups extracted from fenugreek plant and its extracts (aqueous, alcoholic and volatile oil). Results revealed that fenugreek seeds contain the main functional groups, while extracts are varied accorodihg to their content of functional groups qualitatively and quantitively. Moreover, inhibition activity was tested for extracts of fenugreek seeds (aqueous, alcoholic and volatile oil). against gram negative (Salmonella typhimurium, Escherichia coli and Pseudomonas aeruginosa) and gram positive (Staphylococcus aureus) by the ager well diffusion method. Data have revealed that inhibition activity was different in accoradance with extract solvent and the tested microorgan. Oil extract (15)%
... Show MoreYersinia enterocolitica has ranked a third among the pathogens that most frequently cause gastrointestinal disorders transmitted to humans through food materials, especially contaminated meats. The meat infected with Yersinia enterocolitica had no change in apparent texture or smell. The aim of this research is to survey the frequency of Y. enterocolitica in ovine meat, compare their ratio of infection between the season, To carry out this study (125) samples of local ovine meat were collected by random sampling from the middle region of Iraq. The samples were divided into two groups steak and mince, then many microbiological tests (culture, & staining, biochemical Tests Api 20E, Vitik 2 and species-specific PCR amplicon for 16S RNA gene) w
... Show MoreThe purpose of this research was to examine the impact of varying doses of ginger powder on broiler productivity. There were 180 commercial strain Ross 308 day old chicks utilized in the experiment, and each chick was weighed and allocated randomly among four treatments. Three different treatments were tested, each with a replication of 15 chicks. The diet was supplemented with 0.5, 1.0 and 2.0g/kg of ginger powder, respectively, as a control. As compared to the other treatments, the control group had considerably higher body weights, weight growth, feed intake, and feed conversion ratio. Ginger powder use was shown to have a detrimental impact on growth in this investigation.
This research was aimed to evaluate activity of Rosemary volatile oil and Nisin A in vivo and on B. cereus isolated from some canned meat products in vitro. The results showed that the activity of Rosemary volatile oil (2000 µg/ml) and Nisin A (350 µg\ml) attained to 27 and 19 mm inhibitory zone diameter respectively in well diffusion method. The viable plate count from samples of canned meat treated with effective concentration of Rosemary volatile oil and Nisin A were examined. The samples with Rosemary volatile oil was not showed any CFU/g after 9 days of preservation while sample with Nisin A and control observed 49 and 45 CFU/g respectively. In vivo experiment on mice, two weeks after oral dose of Rosemary volatile oil (2000
... Show MoreInthisstudy,FourierTransformInfraredSpectrophotometry(FTIR),XRay Diffraction(XRD)andlossonignition(LOI),comparativelyemployedtoprovideaquick,relativelyinexpensiveandefficientmethodforidentifyingandquantifyingcalcitecontentofphosphateoresamplestakenfromAkashatsiteinIraq.Acomprehensivespectroscopicstudyofphosphate-calcitesystemwasreportedfirstintheMid-IRspectra(4004000cm-1)usingShimadzuIRAffinity-1,fordifferentcutsofphosphatefieldgradeswithsamplesbeneficiatedusingcalcinationandleachingwithorganicacidatdifferenttemperatures.Thenusingtheresultedspectratocreateacalibrationcurverelatesmaterialconcentrationstotheintensity(peaks)ofFTIRabsorbanceandappliesthiscalibrationtospecifyphosphate-calcitecontentinIraqicalcareousphosphateore.Theirpeakswereass
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreBackground: Prosthodontists estimated the parallelism of the occlusal plane to different anatomical landmarks, which was somewhat arbitrary and depended mainly on their vision. The aim of this research was to assess the degree of accuracy of prosthodontists in determining the parallelism of two lines. This research was aimed to assess which technique would be more accurate for the prosthodontist to distinguish parallelism; the comparison of the occlusal plane with the interpupillary line or with the inferior border of the earlobes. Materials and methods: Twenty eight prosthodontic specialists were included in this research. Illustrations of two lines with different tilts were presented to the participants to distinguish whether parallel or
... Show MoreDiesel engine oil was subjected to thermal oxidization (TO) for six periods of time (0 h, 24 h, 48 h, 72 h, 96 h, and 120 h) and was subsequently characterized by terahertz time domain spectroscopy (THz-TDS). The THz refractive index generally increased with oxidation time. The measurement method illustrated the potential of THz-TDS when a fixed setup with a single cuvette is used. A future miniaturized setup installed in an engine would be an example of a fixed setup. For the refractive index, there were highly significant differences among the oxidation times across most of the 0.3–1.7 THz range.
Abstract:
In light of the development in the banking environment and the increasing reliance on electronic systems in providing banking services and due to the intense competition witnessed by the banking sector, the need has emerged to apply the comprehensive electronic banking system, which works on the Internet in providing new and diverse banking services regardless of time and place by linking all branches to one central database, and despite the advantages achieved from the application of the comprehensive system, there is a set of risks that accompany the use of that system, What requires the auditors to develop the audit method in line with the size of the development in the
... Show More