This study includes applying chemical tests on cow, sheep and chicken bones including both hallow and flat. The results of chemical tests on bones mentioned the moisture percentage which was between 4.95-7.32 %, and it was noticed the difference in protein percentage among different kinds of bones, The highest protien percentage was 39.62 % in hallow chicken bones and the lowest was in hallow sheep bones 20.31%, at the same time, the highest Ash percentage was in hallow sheep bones48.11% , whereas the highest percentage of fat was in hallow cow bones 30%. The chemical and physical tests were conducted for extracted fat from hallow and flat bones for cows, sheeps and chicken. It was found that peroxide values (PV), and free fatty acids (FFA) tended to increase proportionally with extraction time at temperatures examined. The lowest values ware obtained after 3 hours as PVs were 0.93, 1.2, 1.0, 1.0, 1.33 and 1.46 meq/ kg oil respectively, FFA values were 0.15, 0.168, 0.187, 0.168, 0.206 and 0.225% respectively. The highest chemical indices for extracted fat from hallow and flat bones for cow and sheep was after 5 hours as PVs were 2.39, 1.8, 1.9, and 1.86 meq/ kg oil respectively, FFA values were 0.253, 0.300, 0.263 and 0.30% respectively. While, the highest chemical indices for extracted fat from hallow and flat chicken bones was after 4 hours, as PVs were 1.6 and 1.73 meq/ kg oil respectively, FFA values were 0.245 and 0.244% respectively. The obtained results showed values of smoking point tended to decrease proportionally as extraction time proceeding at different temperature used, highest values were recorded after extraction for 3 hours, smoking point values were 242.6, 231.33, 223.8, 217.66, 204.5and 204 °C respectively. The lowest physical values of fat extracted from hallow and flat bones of cow and sheep were obtained after 5 hours as the smoking point values were 230.33, 229.83, 203.4 and 204.83°C respectively. The lowest physical indices of fat extracted from hallow and flat chicken bones were obtained after 4 hours, as the smoking point values were 204 and 203.5 °C respectively.
The present study aims to identify the most and the least common teaching practices among faculty members in Northern Border University according to brain-based learning theory, as well as to identify the effect of sex, qualifications, faculty type, and years of experiences in teaching practices. The study sample consisted of (199) participants divided into 100 males and 99 females. The study results revealed that the most teaching practice among the study sample was ‘I am trying to create an Environment of encouragement and support within the classroom which found to be (4.4623). As for the least teaching practice was ‘I use a natural musical sounds to create student's mood to learn’ found to be (2.2965). The study results also in
... Show MoreSocial responsibility has achieved tremendous attention by academicians and practitioners to focus on social responsibility accounting. However, many studies around the globe have been conduct to measure the outcomes of social responsibility accounting. This paper presents the impact of applying the supply chain strategy (SCS) on the agribusiness field to optimize productivity and decreasing cost which will have a direct impact on the net income of the organization. The inconclusive results of earlier studies stimulated this research to social responsibility accounting-financial performance. The equivocal results of this phenomenon urge this study to investigate the role of other factors in the relationship of social responsibility accounti
... Show MoreThe study deals with the issue of multi-choice linear mathematical programming. The right side of the constraints will be multi-choice. However, the issue of multi-purpose mathematical programming can not be solved directly through linear or nonlinear techniques. The idea is to transform this matter into a normal linear problem and solve it In this research, a simple technique is introduced that enables us to deal with this issue as regular linear programming. The idea is to introduce a number of binary variables And its use to create a linear combination gives one parameter was used multiple. As well as the options of linear programming model to maximize profits to the General Company for Plastic Industries product irrigation sy
... Show MoreCommercial banks represent the main pivot in financing national economic activity and its development. The capital represents safety margin to depositors and represents a defense line that protects bank work from dangers. Basel committee requirements represent protection and comprehensive supervision to bank activities for depositors, debtors and the bank. It provides trust in bank dealings and tackles activities of high dangers. The most prominent of these requirements are capital adequacy that concerns bank management and supervision and auditing bodies such as the central bank and protecting banks that suffer weakness in its vital important borrowing activity that reflects weakness in implementing borrowing policy .The purpose
... Show MoreThis study showed that the lens in baloot muluki fish Chondrostoma regium is transparent, spherical shape, and solid in textures, while in the tree frog Hyla arborea savignyi, freshwater turtles Clemmys caspia caspia, white–eared bulbul Pycnonotus leucotis and brown rat Rattus norvegicus are transparent, soft and biconvex, it is very soft in white–eared bulbul. There are many significant differences have been recorded between the average weight lens and the total concentration of the protein in the lens all studied animals. Electrical migration process for lens proteins showed that there is one bundle of crystalline –? and one bundle also crystalline–? in all studied species, either crystalline–? may represent one bundle character
... Show MoreThis study aimed to investigate the role of Big Data in forecasting corporate bankruptcy and that is through a field analysis in the Saudi business environment, to test that relationship. The study found: that Big Data is a recently used variable in the business context and has multiple accounting effects and benefits. Among the benefits is forecasting and disclosing corporate financial failures and bankruptcies, which is based on three main elements for reporting and disclosing that, these elements are the firms’ internal control system, the external auditing, and financial analysts' forecasts. The study recommends: Since the greatest risk of Big Data is the slow adaptation of accountants and auditors to these technologies, wh
... Show More
Abstract
Due to the lack of previous statistical study of the behavior of payments, specifically health insurance, which represents the largest proportion of payments in the general insurance companies in Iraq, this study was selected and applied in the Iraqi insurance company.
In order to find the convenient model representing the health insurance payments, we initially detected two probability models by using (Easy Fit) software:
First, a single Lognormal for the whole sample and the other is a Compound Weibull for the two Sub samples (small payments and large payments), and we focused on the compoun
... Show MoreCoronavirus disease (Covid-19) has threatened human life, so it has become necessary to study this disease from many aspects. This study aims to identify the nature of the effect of interdependence between these countries and the impact of each other on each other by designating these countries as heads for the proposed graph and measuring the distance between them using the ultrametric spanning tree. In this paper, a network of countries in the Middle East is described using the tools of graph theory.
A key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show More