The grain hardness, wet and dry gluten contents, protein and ash contents are determined in grains from different cultivars of wheat which are important in food products, either which are present in raw materials or in final products. Wheat is also a very important food raw material, and flour as the final product of milling. The importance of knowing the physical and chemical properties of wheat and flour is due to the determination of quality and kind of flour which is produced after the milling process. In this work, some physical and chemical properties of different wheat cultivars are determined and the comparisons of these characteristics are performed in both wheat and flour. Uruq Wheat sample (W5) has the highest results when compared with other wheat cultivar reaching 82 kg/ hectoliter, 9.2 % and 41 gm, 0.81, 8.8, 5.5, 30 %, 67 %, 73.6 %, 518, 858 specific weight, moister, 1000 grain Weight (gm), Ash %, Moister %, color test, moist. gluten %, Gluten index %, Absorption %, Falling No. and gelatination respectivelywith specifications grain white, transparent color, uneven gully depth and full cross-section of a glasses grain. The lowest results are by contrast with Forat cultivar in sample W2. Characteristics that are observed in this work are affect of the contents of with to moister, ash, protein, gluten and water absorption values there are useful for milling industry of different wheat cultivars.
The issue of increasing the range covered by a wireless sensor network with restricted sensors is addressed utilizing improved CS employing the PSO algorithm and opposition-based learning (ICS-PSO-OBL). At first, the iteration is carried out by updating the old solution dimension by dimension to achieve independent updating across the dimensions in the high-dimensional optimization problem. The PSO operator is then incorporated to lessen the preference random walk stage's imbalance between exploration and exploitation ability. Exceptional individuals are selected from the population using OBL to boost the chance of finding the optimal solution based on the fitness value. The ICS-PSO-OBL is used to maximize coverage in WSN by converting r
... Show MoreIn this research, CNRs have been synthesized using pyrolysis of plastic waste(pp) at 1000 ° C for one hour in a closed reactor made from stainless steel, using magnesium oxide (MgO) as a catalyst. The resultant carbon nano rods were purified and characterized using energy dispersive X-ray spectroscopy (EDX), X-ray powder diffraction (XRD). The surface characteristics of carbon rods were observed with the Field emission scanning electron microscopy (FESEM). The carbon was evenly spread and had the highest concentration from SEM-EDX characterization. The results of XRD and FESEM have shown that carbon Nano rods (CNRs) were present in Nano figures, synthesized at 1000 ° C and with pyrolysis temperature 400° C. One of t
... Show MoreThe UN plans to achieve several development objectives by 2030. These objectives address global warming, a major issue. This method aims to improve sustainable accounting performance (AP). In this circumstance, AI is being applied in various fields, notably in economic, social, and environmental (ESE) domains. This research investigates how sustainable development (SD) influences AI methodologies and AP improvement. The research examined a sample of Iraqi banks listed on the Iraq Stock Exchange from 2014 to 2022. AI was measured by ATM and POS prevalence. A three-dimensional approach examined economic, social, and environmental (ESE) sustainability. Meanwhile, the performance of sustainable accounting was measured through the return on asse
... Show MoreFor more than a decade, externally bonded carbon fiber reinforced polymer (CFRP) composites successfully utilized in retrofitting reinforced concrete structural elements. The function of CFRP reinforcement in increasing the ductility of reinforced concrete (RC) beam is essential in such members. Flexural and shear behaviors, ductility, and confinement were the main studied properties that used the CFRP as a strengthening material. However, limited attention has been paid to investigate the energy absorption of torsion strengthening of concrete members, especially two-span concrete beams. Hence, the target of this work is to investigate the effectiveness of CFRP-strengthening technique with regard to energy absorption of two-span RC
... Show MoreVarious simple and complicated models have been utilized to simulate the stress-strain behavior of the soil. These models are used in Finite Element Modeling (FEM) for geotechnical engineering applications and analysis of dynamic soil-structure interaction problems. These models either can't adequately describe some features, such as the strain-softening of dense sand, or they require several parameters that are difficult to gather by conventional laboratory testing. Furthermore, soils are not completely linearly elastic and perfectly plastic for the whole range of loads. Soil behavior is quite difficult to comprehend and exhibits a variety of behaviors under various circumstances. As a result, a more realistic constitutive model is
... Show MoreCancer disease has a complicated pathophysiology and is one of the major causes of death and morbidity. Classical cancer therapies include chemotherapy, radiation therapy, and immunotherapy. A typical treatment is chemotherapy, which delivers cytotoxic medications to patients to suppress the uncontrolled growth of cancerous cells. Conventional oral medication has a number of drawbacks, including a lack of selectivity, cytotoxicity, and multi-drug resistance, all of which offer significant obstacles to effective cancer treatment. Multidrug resistance (MDR) remains a major challenge for effective cancer chemotherapeutic interventions. The advent of nanotechnology approach has developed the field of tumor diagnosis and treatment. Cancer nanote
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More