A number of juices, jams, canned foods and frozen fishes available in local markets were inspected with respect to microbial contamination. We have determined the total viable bacterial cell counts in these samples and the number of g(-) lactose fermentors as a bacterial indicator of food spoilage. The results indicated that most of the food items inspected, were contaminated with large numbers of different species of g(-) ,g(+), yeast and fungi and some were contained more than the maximum permissible number of pathogenic g(-) enteric E-coli, which render these food items unsafe for human consumption.
The research focused on (balanced performance and structural mechanisms in industrial product design systems) by focusing on product development in a manner that is able to meet the human requirements through the effect of smart technology on the systems of product designs and its effectiveness in achieving the design and functional variables that have an effective effect in User and industrial products, correspond to the requirements of the user life at the level of daily interaction. The first chapter ensures the problem of research is the following question: What are the mechanisms to achieve balanced performance in some systems design to fit with the variables B N User and industrial products? The objective of the research was to ide
... Show MoreA dust storm in Iraq is a climatic phenomenon common in arid and semi-arid regions . The frequency of the occurrence has increased drastically in the last decade and it is increasing continuously .Baghdad city like the rest of Iraq is suffering from the significant increase in dust storms . In this research , the study of the phenomenon of dust storms for all types (Suspended dust , rising dust , dust storm) , and its relationship with some climate variables (Temperature , rainfall ,wind speed) .The statement of the impact of climate change on this phenomenon to Baghdad station for the period (1981 – 2012) . Time series has been addressing the phenomenon of storms and cli
... Show MoreEmbedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
Abstract* Backgrounds The retention of the maxillary complete denture may be influenced by adequate recording in the patient’s mouth, marking, and carving of the post-dam on the maxillary cast. Failure to do so may lead to loss of retention. Successful denture construction with patient’s comfort could be achieved by effective methods of recording, marking, and carving of the post-dam. The aim of the study was to assess Iraqi dentists in their knowledge and application of the post-dam in maxillary complete dentures. Methods Questionnaires were distributed randomly through online Google Forms and 118 Iraqi dentists with different academic degree participated in the study. A multinomial logistic regression model was also used to ass
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.
A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.
Being unsatisfied with the job was as
Abadan, one of the modernists, is the critics, whose words depend on the wound, the modification and the ills of the hadeeth.
He lived Abadan, age in the request to talk and take the elders, and Awali, and attribution, which affected him by taking, and update about (300) Sheikh or more.
Abadan also excelled in the novel and its origins, which made students talk to him, and ask for the novel, with his hardness and hardship. As we will see in the folds of the search
A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .