White and black chia seeds were used in some food products, such us gluten –free biscuits processing by using rice flour and chia seeds (white and black) with these amonths 112.5, 74.25, 56.25, 27.5 g with 27.5g of quinoa seeds for treatments 1, 2, 3 and 4 respectively, and comparison sensitively with the control treatment which has no additions including the appearance and homogenization of the product, surface cracks, softness, taste and flavor, core color and the specific volume, some microbiological tests were performed for biscuit product after storage for 4 months at 30 and 50°C including bacterial total count and fungal and yeast count, results showed that there weren’t any observation of bacteria or yeast or fungal growth at the beginning till the end of storage.
Psoriasis is a chronic inflammatory skin disease that is closely related to the oxidative stress state of the body. The current study focused on some immunological indicators directly related to inflammation (Procalcitonin, and lysozyme) with the aim of investigating their potential as a prognostic factor for psoriasis. This study included 150 samples, including 90 patients with psoriasis and 40 people who appeared to be healthy, and was conducted from November 2021 to April 2022. The results showed a significant increase in the level of procalcitonin in patients with psoriasis compared to its level in the control group, while it was noted that the increase in the level of the other indicators was not significant, according to the statis
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MorePiperine, a crystalline alkaloid compound isolated from Piper nigrum, piper longum, and other types of piper, has had many fabulous pharmacological advantages for preventing and treating some specific diseases, such as analgesic, anti-inflammatory, hepatoprotective, antimetastatic, antithyroid, immunomodulatory, antitumor, rheumatoid arthritis, osteoarthritis, Alzheimer's, and improving the bioavailability of other drugs. However, its potential for clinical use through oral usage is hindered by water solubility and poor bioavailability. The low level of oral bioavailability is caused by low solubility in water and is photosensitive, susceptible to isomerization by UV light, which causes piperine concentration to decrease. Many different
... Show MoreThe taxonomy of Ficus L., 1753 species is confusing because of the intense morphological variability and the ambiguity of the taxa. This study handled 36 macro-morphological characteristics to clarify the taxonomic identity of the taxa. The study revealed that Ficus is represented in the Egyptian gardens with forty-one taxa; 33 species, 4 subspecies and 4 varieties, and classified into five subgenera: Ficus Corner, 1960; Terega Raf., 1838; Sycomorus Raf., 1838; Synoecia (Miq.) Miq., 1867, and Spherosuke Raf.,1838; out of them seven were misidentified. Amongst, four new Ficus taxa were recently introduced to Egypt namely: F. lingua subsp. lingua Warb. ex De Wild. & T. Durand, 1901; F. pumila L., 1753; F. rumphii Blume, 1825, and F. su
... Show MoreInformation security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
Strengthening of the existing structures is an important task that civil engineers continuously face. Compression members, especially columns, being the most important members of any structure, are the most important members to strengthen if the need ever arise. The method of strengthening compression members by direct wrapping by Carbon Fiber Reinforced Polymer (CFRP) was adopted in this research. Since the concrete material is a heterogeneous and complex in behavior, thus, the behavior of the confined compression members subjected to uniaxial stress is investigated by finite element (FE) models created using Abaqus CAE 2017 software. The aim of this research is to study experimentally and numerically, the beha
... Show MoreAd hoc networks are characterized by ease of setup, low costs, and frequent use in the corporate world. They ensure safety to the user and maintain the confidentiality of the information circulated. They also allow the user to address the cases of communication failure in areas subject to destruction of communication infrastructure. The proposed protocols in the ad hoc networks often build only one path to achieve communication between the nodes, due to the restrictions of battery run out and the movement of the nodes. This connection is often subject to a failure within a certain range. Thus, multiple alternate paths in ad hoc networks use a solution to failing node communications. In addition, when looking at the situation where interf
... Show MoreA mathematical model is developed to discuss the impact of the Hall current and the Joule heating on the peristaltic flux of finitely extensible nonlinear elastic Peterlin (FENE-P) fluid in a tapered tube with mild stenosis. The fluid movement along the wall surface resulted from the sinusoidal wave flowing with constant speed. Conditions of velocity and thermal slip are applied. Lubrication approximation is adopted to modify the governing flow problem. To discover the solution to a system of equations, the regular perturbation approach is used. The effects of the different physical parameters are debated and graphically shown in a set of figures. It is discovered that as the Hall current parameter is increased and the Hartman n
... Show More3D models delivered from digital photogrammetric techniques have massively increased and developed to meet the requirements of many applications. The reliability of these models is basically dependent on the data processing cycle and the adopted tool solution in addition to data quality. Agisoft PhotoScan is a professional image-based 3D modelling software, which seeks to create orderly, precise n 3D content from fixed images. It works with arbitrary images those qualified in both controlled and uncontrolled conditions. Following the recommendations of many users all around the globe, Agisoft PhotoScan, has become an important source to generate precise 3D data for different applications. How reliable is this data for accurate 3D mo
... Show MoreResearch aims
1. Measuring expectations of self-efficiency at teachers of secondary schools.
2. Measuring biological skills at teachers of secondary schools.
3. There is no sole or gathering forecasting of forecasting expectations of self-efficiency , may forecasts about biological skills at teachers of secondary schools.
To fulfill aims of the research, the researcher managed measuring of expectations of self-efficiency according to point of view of Bandura for this concept in this research, arranging measure of biological skills according to view of global health, the researcher has made to investigate of truth , constant these two measurements, analyzing statistically their two paragraphs on a sample (460) teachers (males