Preferred Language
Articles
/
bsj-951
The Effect of Sodium Propionate on Microorganism and Self life of Laboratory Biscuit
...Show More Authors

This study has been conducted to examin the effect of sodium propionate at different level of 0.03,0.06,0.10% on the number of bacteria and mold and to extend the storage life of laboratory processed biscuit. The results indicated that the use of 0.10% sodium propionate prolonged the storage peroid until the third month, while the use of 0.20% sodium propionate showed no growth of bacteria up to six month of storage, three types of bacteria has been isolated from processed biscuit, namely, Staphylococcus aureus, Bacillus cereus, Esherichia coli. using 0.10% sodium propionate showed no growth of mold up to three month of storage ,while using of 0.15 % and 0.20% sodium propionate prevent the growth of mold up to five and six months of storage respectively, Penicillum sp ,Aspergillus terrius, Aspergillus niger, flavus Aspergillus were isolated from the processed biscuit.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
the purposes of belief The concept of the purposes of belief and its importance: The first requirement: the concept and the aim of contractual purposes, The second requirement: the importance of nodal purposes
...Show More Authors

 

Abstract

This research deals with the definition of the concept of nodal purposes, And what is related to it, from its aim and importance, And for the purposes of the importance of Streptococcus In trying to understand the nodal truths For different minds, Especially with those who object to the introduction of belief in purposes studies, This research has two requirements:

 The first requirement: the concept and the aim of contractual purposes,It consists of two branches, The first is in the concept of nodal purposes, And it dealt with the definitions in terms of language and terminology And what we see is proportional to what aim

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 16 2016
Journal Name
International Journal Of Computer Applications
Experimental Study of CLARK-Y Smoothed Inverted Wing with Ground Effect
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
North American Journal Of Medical Sciences
Antagonistic effect of bacteriocin against urinary catheter associated Pseudomonas aeruginosa biofilm
...Show More Authors

View Publication Preview PDF
Scopus (44)
Crossref (27)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
International Journal Of Innovative Research In Science, Engineering And Technology
Effect of Vertical Irregularity in Multi-Storied Building under Seismic Loading
...Show More Authors

Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
Modelling of electron trajectories inside SEM chamber concerning mirror effect phenomenon
...Show More Authors

A computational investigation is carried out to describe the behaviour of reflected electrons upon a charged insulator sample and producing mirror effect images. A theoretical expression for the scanning electron path equation is derived concerning Rutherford scattering and some electrostatic aspects. The importance of the derived formula come from its correlation among some of the most important parameters that controls the mirror effect phenomena. These parameters, in fact, are the trapped charges, incident angle and the scanning potential which investigated by considering its influences on the incident electrons. A pervious experimental operation requirements are adopted for operating the introduced expression. However, the obtained r

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Sep 30 2013
Journal Name
Iraqi Journal Of Science
Protective Effect of Vitamin A against Oxidative Stress Caused by Methotrexate
...Show More Authors

Methotrexate (MTX), a folate antagonist agent, is mainly used in treatment of malignant tumors and autoimmune diseases. The present study was undertaken to determine whether antioxidant vitamin (vitamin A) could ameliorate methotrexate induced oxidative stress in male rabbits. Twenty male rabbits were randomly assigned into four groups. Group 1: control group, Group 2: MTX-treated group (received 20 mg/kg MTX intraperitoneally), Group 3: Vit.A treated group received 5000 IU Vit.A orally) and Group 4: MTX+Vit.A treated group received MTX 20 mg/kg plus 5000 IU vit.A). After 4 weeks of treatment, blood samples were collected by cardiac puncture to determine the serum malondialdehyde (MDA), as a good indicator for lipid peroxidation and

... Show More
Publication Date
Tue Jan 07 2020
Journal Name
International Journal Of Innovative Research In Science, Engineering And Technology
Effect of Vertical Irregularity in Multi-Storied Building under Seismic Loading
...Show More Authors

Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref