Preferred Language
Articles
/
cxZpuosBVTCNdQwCE9jr
Detection of Mineral and Microbial Contaminants in some Types of Imported Meat
...Show More Authors
Abstract<p>The main target of the current study is to investigate the microbial content and mineral contaminants of the imported meat available in the city of Baghdad and to ensure that it is free from harmful bacteria, safe and it compliances with the Iraqi standard specifications. Some trace mineral elements such as (Iron, Copper, Lead, and Cadmium) were also estimated, where 10 brands of these meats were collected. Bacteriological tests were carried out which included (total bacterial count, <italic>Staphylococcus</italic> bacteria, <italic>Salmonella</italic> bacteria). The results showed highest number of total bacterial count 13×10<sup>5</sup> CFU/g in F8 brand, while the lowest number of bacteria 5×101 CFU/g in F3 brand. However, <italic>Staphylococcal</italic> bacteria showed the highest number of 66×10<sup>2</sup> CFU/g in F7 brand, while the lowest number of <italic>Staphylococcal</italic> bacteria amounted to 1×10<sup>1</sup> CFU/g in F9 brand. The number of <italic>Salmonella</italic> bacteria in imported meat samples, the two brands contained <italic>Salmonella</italic> bacteria were (F2, F7), while the other brands were free of <italic>Salmonella</italic> bacteria. The results showed that the highest concentration of Cu was 1.658 μg/g in F7 brand, whereas the lowest concentration of Cu was in F6 brand amounting to 0.093 μg/g. However, highest concentration of Pb reached 0.040 μg/g in F6 brand, while the lowest concentration of Pb was recorded in F2 brand reaching 0.002 μg/g. Furthermore, the highest concentration of Cd was 0.004 μg/g in F7 brand whereas the lowest detected concentration of Cd was in (F1, F4, F5, F9, and F10) brands reaching 0.000 μg<sup>/</sup>g.</p>
Scopus Crossref
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Wed Feb 15 2023
Journal Name
Full Text Book Of Minar Congress 7
EVALUATING THE CHANGE DETECTION OF(NDVI) FOR BABYLON CITY USING REMOTE SENSING AND GIS TECHNIQUES (2015-2020)
...Show More Authors

The normalized difference vegetation index (NDVI) is an effective graphical indicator that can be used to analyze remote sensing measurements using a space platform, in order to investigate the trend of the live green vegetation in the observed target. In this research, the change detection of vegetation in Babylon city was done by tracing the NDVI factor for temporal Landsat satellite images. These images were used and utilized in two different terms: in March 19th in 2015 and March 5th in 2020. The Arc-GIS program ver. 10.7 was adopted to analyze the collected data. The final results indicate a spatial variation in the (NDVI), where it increases from (1666.91 𝑘𝑚2) in 2015 to (1697.01 𝑘𝑚2)) in 2020 between the t

... Show More
View Publication
Crossref
Publication Date
Mon Apr 29 2024
Journal Name
Journal Of The College Of Basic Education
Detection Of Biofilm Formation By Beta- Lactam Resistance Klebsiella Pneumoniae Isolated From Clinical Specimens And Aquatic Samples
...Show More Authors

Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Change detection of the land cover for three decades using remote sensing data and geographic information system
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sat Nov 29 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Early detection of periodontitis among young adult cigarette smokers and non-smokers using cone beam computed tomography
...Show More Authors

Background: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth exc

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (19)
Crossref (9)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Study the Ability of Pseudomonas Aeruginosa Isolated from Different Clinical Cases to Biofilm Formation and Detection of Algd Gene.
...Show More Authors

98 samples were collected from various clinical sources included (Burns, wounds, urines, sputums, blood) From the city of Baghdad, After performing the biochemical and microscopic examination, 52 isolates were obtained for Pseudomonas aeruginosa, 17 (32.7%) isolates from burn infection, 12 (23%) isolates from Wound infection 11 (21.2%) isolates from urine infection, 7 (13.5%) isolates of sputum and 5 (9.6%) isolates from blood. Bacteria susceptibility to form biofilm has been detectedby microtiter plate method, The results showed that 80% of the bacterial isolates were produced the biofilm with different proportions, alg D gene (alginate production) has been detected by polymerase chain reaction (PCR) Which plays an essential role in the fo

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (21)
Crossref (12)
Scopus Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Effect of Some Fungal Pathogen and Some Storage Treatments on Tomato and Cucumber Fruits Under Cold Storage (8? C)
...Show More Authors

In study carried out in the cold storage in college of Agric./Univ. of Baghdad at 8 ? C. shows that Alternaria , Pencillium , Rhizoctonia , Mucor , are the fungi that causes tomato fruits decay. This is the first record of Rhizoctonia and Mucor as a Tomato fruits rot under 8º c in Iraq. There is no fungal infection on cucumber fruits under 8 ? C. . Waxing tomato fruits reduced the severity of the fungi infection and gave shelflife (19 days) under 8 ? C. There is an infection with Mucor was found in tomato fruits kept in perforated polyethylene bages with 16 bores prevent the infection and the lowest severity and frequency of infection was found in waxed tomato fruits. Part of M.Sc thesis of the Second author.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Synthesis and Characterization of Some New Mixed- Ligand Complexes Containing Schiff Base and 3-Picoline with Some Metal Salts
...Show More Authors

Some metal ions (Mn+2, Co+2, Ni+2, Cu+2,Zn+2 and Cd+2) complexes of quodridentats Schiff base derived from (2-hydroxy benzaldehyde and 4,4'-methylenedianiline as primary ligand and 3-picoline (3-pic) secondary ligand have been synthesized and characterized on the basis of their 1H ,13C-NMR, FT-IR, UV-Vis spectroscopy, conductivity measurements, elemental analysis, and magnetic moments, metal to ligands ratio in all complexes has been found to be (1:1:2) (M:Schiff base:3-pic), Schiff base behaves as neutral tetra dentate ligand with (N2,O2) system from the results obtained, the following general formula has suggested for the prepared complexes [M+2(2-mbd)(3-pic)2] and octahedral stereochemistry, Where M+2 = (Mn , Co , Ni , Cu , Zn and Cd), 2

... Show More