In this study four cheese samples were randomly collected from local markets. These cheese samples were Ishaqi, Danone, Arab white cheese and Agricultural college cheese.
Results obtained revealed that all these cheese samples were contaminated by fungi in addition to the presence of same heavy metals under study which were Fe, Pb, Ni and Cr. All fungal contaminat were identified which were contaminated them in winter (January). However, fungal pollution in summer was 100% while in winter was 50% Aspergillus niger was polluted chees samples100% in summer while it was 75% in winter. Aspergillus fumigatus was polled cheese samples under study 50% in summer and 0% in winter .Results for heavy metals determination revealed that Fe was contaminated cheese samples followed by Ni, Pb and finally Cr and the percentage of their presence was (0.24, 0.006, 0.006, 0.001 ppm) respectively .
‎ Since the first outbreak in Wuhan, China, in December 31, 2019, COVID-19 pandemic ‎has been spreading to many countries in the world. The ongoing COVID-19 pandemic has caused a ‎major global crisis, with 554,767 total confirmed cases, 484,570 total recovered cases, and ‎‎12,306 deaths in Iraq as of February 2, 2020. In the absence of any effective therapeutics or drugs ‎and with an unknown epidemiological life cycle, predictive mathematical models can aid in ‎the understanding of both control and management of coronavirus disease. Among the important ‎factors that helped the rapid spread of the ep
... Show MoreThe university course timetable problem (UCTP) is typically a combinatorial optimization problem. Manually achieving a useful timetable requires many days of effort, and the results are still unsatisfactory. unsatisfactory. Various states of art methods (heuristic, meta-heuristic) are used to satisfactorily solve UCTP. However, these approaches typically represent the instance-specific solutions. The hyper-heuristic framework adequately addresses this complex problem. This research proposed Particle Swarm Optimizer-based Hyper Heuristic (HH PSO) to solve UCTP efficiently. PSO is used as a higher-level method that selects low-level heuristics (LLH) sequence which further generates an optimal solution. The proposed a
... Show MoreThe interest in green energy in recent years is very noticeable, as this energy is a very important alternative that can replace fuel in many applications, most notably electric power generation, so work must be done to develop a form of this energy such as wind energy by working on the development of turbines. The DMST method provided by Qblade software is an integrated tool for making a simulation of a vertical axis wind turbine (VAWT). The simulation was carried out on vertical axis wind turbines, designing turbine blades according to symmetrical NACA0018, and calculating some parameters such as power, torque and power coefficient. It is found that this type of turbine can be improved by treating the blade edges that cont
... Show MoreBackground. After tooth extraction, alveolar bone resorption is inevitable. This clinical phenomenon challenges dental surgeons aiming to restore esthetic and function. Alveolar ridge preservation can be applied to minimize dimensional changes with a new socket grafting material, an autogenous dentin graft, produced by mechanically and chemically processing natural teeth. This study assessed the safety and efficacy of using autogenous dentin biomaterial in alveolar ridge preservation. Materials and Methods. Patients with nonrestorable maxillary anterior teeth bounded by natural sound teeth were included in this study. After a detailed clinical and tomographic examination, eligible participants were randomly allocated into two groups
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More