Pectin is available in many plants and in this study, the peels of tomatoes and beet were used to be an economical source of pectin production instead of dumping it with waste or using it as animal feed. The pectin extracted from the peels using different solutions, namely citric acid (2 M), oxalic acid (2%) and hydrochloric acid (0.5 M) the outcome of the extraction methods, 7. 1%, 6% and 11% respectively for tomatoes peels, while the pectin of beet peels were 8%, 6.5%, and 8.3%, and the highest percentage obtained in the manner of hydrochloric acid adopted in the manufacture of yogurt.Yogurt was manufactured with four treatments, in the first treatment standard pectin was added and the second treatment in addition to the pectin extracted from the peels of the tomatoes and the third treatment in addition to the peels of the beet and the treatment forth without adding any pectin. The samples were incubated with 42°C for 5 hours and the flavor grades were 9.2, 7.4, 7.2, 6.6 and the viscosity were 9.1, 8.6, 8.2, 5.3 for yogurt made with standard pectin and yogurt made with pectin extracted from tomatoes peels, and yogurtmade with pectin extracted from beet peels and pectin-free milk, respectively and the same order for color 9.3, 8.2 and 7.8. To know the ability of pectin to catch water, the yogurtwas recycled in the aforementioned treatments after milk was manufactured at a low solid rate material of (10%) and the incubation period was extended to 24 hours to help the whey become clear and it was found that the pectin-free milk had exuded the whey, while the standard pectin was able to prevent the extruding entirely while there was littleexudation in the treatment containing the pectin of tomatoes. There was more exudation in the treatment containing the pectin of the beet.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThis research discussed, the process of comparison between the regression model of partial least squares and tree regression, where these models included two types of statistical methods represented by the first type "parameter statistics" of the partial least squares, which is adopted when the number of variables is greater than the number of observations and also when the number of observations larger than the number of variables, the second type is the "nonparametric statistic" represented by tree regression, which is the division of data in a hierarchical way. The regression models for the two models were estimated, and then the comparison between them, where the comparison between these methods was according to a Mean Square
... Show MoreAbstract
The vegetative filter strips (VFS) are a useful tool used for reducing the movement of sediment and pesticide in therivers. The filter strip’s soil can help in reducing the runoff volume by infiltration. However, the characteristics of VFS (i.e., length) are not recently identified depending on the estimation of VFS modeling performance. The aim of this research is to study these characteristics and determine acorrelation between filter strip length and percent reduction (trapping efficiency) for sediment, water, and pesticide. Two proposed pesticides(one has organic carbon sorption coefficient, Koc, of 147 L/kg which is more moveable than XXXX, and another one
... Show MoreThe Population growth and decay issues are one of the most pressing issues in many sectors of study. These issues can be found in physics, chemistry, social science, biology, and zoology, among other subjects.
We introduced the solution for these problems in this paper by using the SEJI (Sadiq- Emad- Jinan) integral transform, which has some mathematical properties that we use in our solutions. We also presented the SEJI transform for some functions, followed by the inverse of the SEJI integral transform for these functions. After that, we demonstrate how to use the SEJI transform to tackle population growth and decay problems by presenting two applications that demonstrate how to use this transform to obtain solutions.
Fin
... Show MoreRecently Tobit Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique and Bayesian hierarchical model with adaptive ridge regression technique .
in double adaptive elastic net technique we assume different penalization parameters for penalization different regression coefficients in both parameters λ1and λ2 , also in adaptive ridge regression technique we assume different penalization parameters for penalization different regression coefficients i
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreThis study was conducted in Animal Resources Department , College of Agriculture to estimate the effect of chemical and biological treatments to improve the nutritive value of poor quality roughages ( corn cobs and wild reed ) . The feeds were treated chemically with 4% NaoH solution ,whereas Aspergillus niger was used to ferment corn cobs and wild reed samples . The chemical analysis showed that protein percentages of corn cobs and wild reed was increased significantly (P<0.05) from 6.05% to 10.51% and 17.70% and from 3.10 %to 6.50% and 9.96% for both chemical and biological treatments respectively. The crude fiber percentages decreased significantly (P<0.05) from 29.19% and 26.10% to 23.60% and 20.10% for chemical treatment and was 20
... Show MoreIn this study, the spreading of the pandemic coronavirus disease (COVID-19) is formulated mathematically. The objective of this study is to stop or slow the spread of COVID-19. In fact, to stop the spread of COVID-19, the vaccine of the disease is needed. However, in the absence of the vaccine, people must have to obey curfew and social distancing and follow the media alert coverage rule. In order to maintain these alternative factors, we must obey the modeling rule. Therefore, the impact of curfew, media alert coverage, and social distance between the individuals on the outbreak of disease is considered. Five ordinary differential equations of the first-order are used to represent the model. The solution properties of the system ar
... Show MoreThe pure and Sb doped GeSe thin films have been prepared by thermal flash evaporation technique. Both the structural and optical measurement were carried out for as deposited and annealed films at different annealing temperatures.XRD spectra revealed that the all films have one significant broad amorphous peak except for pure GeSe thin film which annealed at 573 K, it has sharp peak belong to orthorhombic structure nearly at 2θ=33o. The results of the optical studies showed that the optical transition is direct and indirect allowed. The energy gap in general increased with increasing annealing temperature and decreased with increase the ratio of Sb dopant. The optical parameters such as refractive index, extinction coefficient and real and
... Show More