This study has been conducted to investigate the influence of preservatives(sodium propionate and potassium sorbate) at different levels to extend the storage life of laboratory processed biscuit.The results have shown that When%0.10 sodium propionate was added bacteria and fungi was not found for three months while found in the fourth month of storage.However bacteria and mold didnot grow until the sixth month of storage as %0.20 and %0.30 concentration was used. On the other side as %0.03 potassium sorbate was used,the growth of bacteria was cheched for 3 months and 4 months for molds..When %0.06 potassium sorbate was used no growth of bacterial or mold was found until the sixth month of storage . Three types of bacteria have been appeared in processed biscuit, namely, Staphylococcus aureus, Bacillus cereus, Esherichia coli. In different percentage. and two genera of mold have been found with different rates ,they were Aspergillus and Penicillium. The sensory evaluation of processed biscuit stored for 6 months showed that treatment with %0.30 sodium propionate and %0.10 potassium sorbate were superior as compared to control, they obtained the highest over all acceptance which valued 4.9, 4.7 respectively, while the control treatment obtained 4.1 .
The international reporting auditor witness rapidly developed over the past years, where profession began give attention to the development of auditor reporting and improve its informational report through the issuance and amendment of some relevant international auditing standards. The reality of the situation refers to the failure to inform the auditor in Iraq in many areas, including: Clearly defined management responsibility for the preparation of financial and auditor's responsibility to express an opinion on these statements and Amendment of opinion when the financial statements as a whole is free from material misstatement based on the evidence is sufficient and appropriate audit, or not to build the auditor's ability to obt
... Show MoreIntervention in International Relations from the concepts that are still highly
controversial among those he considers a breach of international law and the UN Charter and
in violation of the rule , and those who felt that the need provided, however, that this is linked
motives humanity recognized by the international community , because the international
variables proved the inadequacy of the principle of non-interference and the principle of
sovereignty as the traditional variables international , and therefore most of the international
practice came a bus with many of the behaviors that reflect a decline in its entirety to these
principles , and became adapt these principles with international reality is too compl
كان المؤتمر الآسيوي الأفريقي الأول الذي عُقد في مدينة باندونغ الاندونيسية عام 1955 هو المؤتمر هو الأول الذي اجتمعت فيه الدول الآسيوية والأفريقية بعد الحرب العالمية الثانية. كان مؤتمر باندونغ بمثابة نقطة الانطلاق نحو تأسيس حركة عدم الانحياز، والتي كانت مصر أحد أبرز أقطابها. شهد المؤتمر تقاربا في الآراء ووجهات النظر بين جمهورية مصر العربية وجمهورية الصين الشعبية، لا سيّما وإن الحكومة المصرية كانت قد تبنت س
... Show MoreThe aim of this essay is to use a single-index model in developing and adjusting Fama-MacBeth. Penalized smoothing spline regression technique (SIMPLS) foresaw this adjustment. Two generalized cross-validation techniques, Generalized Cross Validation Grid (GGCV) and Generalized Cross Validation Fast (FGCV), anticipated the regular value of smoothing covered under this technique. Due to the two-steps nature of the Fama-MacBeth model, this estimation generated four estimates: SIMPLS(FGCV) - SIMPLS(FGCV), SIMPLS(FGCV) - SIM PLS(GGCV), SIMPLS(GGCV) - SIMPLS(FGCV), SIM PLS(GGCV) - SIM PLS(GGCV). Three-factor Fama-French model—market risk premium, size factor, value factor, and their implication for excess stock returns and portfolio return
... Show MoreThe Arab-Israeli conflict passed through several stages before reaching the final stage of normalization, namely conflict, conflict and public normalization. Thus, the UAE became the third country to establish official relations with Israel after Egypt in 1979 and Jordan in 1994. With the announcement of the normalization agreement, opinions varied between supporters and opponents of the idea of normalization with Israel, and some countries expressed their acceptance of establishing official relations between the Emirates and Israel, while others warned of the consequences of normalization, which they described as treachery. Although the UAE confirmed that the normalization agreement between the two sides was credited with stopping Israel's
... Show Moreيعد هذا النص أحد النصوص المسمارية المصادرة التي بحوزة المتحف العراقي، ويحمل الرقم المتحفي (235869)، قياساته )12،7x 6x 2،5سم). يتضمن مدخولات كميات من الشعير،أرخ النص الى عصر أور الثالثة (2012-2004 ق.م) و يعود الى السنة الثالثة من حكم الملك أبي-سين (2028-2004 ق.م)،أن الشخصية الرئيسة في هذا النص هو)با-اَ-كا مسمن الماشية( من مدينة أري-ساكرك، ومقارنته مع النصوص المسمارية المنشورة التي تعود الى أرشيفه يبلغ عددها (196) نصاً تضمنت نشاطاته م
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More