The increase in obesity and the many accompanying diseases is attributed to the increased production and consumption of foods made of non-nutritive sweeteners without regard to the risks of consuming additional calories, and this in turn leads to hormonal imbalance and metabolic disorders and the resulting imbalance and ill health that have spread to all segments of society. During the research, 0.01, 0.02, 0.03, 0.04 and 0.05 % of stevia sweetener was added to the cream instead of the sugar used. Physical and chemical tests were performed for the stevia extract and the microbial content in the cream, as well as the sensory evaluation. It was noted that fortifying the cream with calorie-free stevia sugar led to the production of a cream with excellent texture, color and taste, with a very desirable sweetness and flavor, and the absence of any strange taste or flavor.
This study thoroughly investigates the potential of niobium oxide (Nb2O5) thin films as UV-A photodetectors. The films were precisely fabricated using dc reactive magnetron sputtering on Si(100) and quartz substrates, maintaining a consistent power output of 50W while varying substrate temperatures. The dominant presence of hexagonal crystal structure Nb2O5 in the films was confirmed. An increased particle diameter at 150°C substrate temperature and a reduced Nb content at higher substrate temperatures were revealed. A distinct band gap with high UV sensitivity at 350 nm was determined. Remarkably, films sputtered using 50W displayed the highest photosensitivity at 514.89%. These outstanding optoelectronic properties highlight Nb2O5 thin f
... Show MoreAbstract Objective: The underlying molecular basis of ischemic heart diseases (IHDs) has not yet been studied among Iraqi people. This study determined the frequency and types of some cardiovascular genetic risk factors among Iraqi patients with IHDs. Methods: This is a cross-sectional study recruiting 56 patients with acute IHD during a 2-month period excluding patients >50 years and patients with documented hyperlipidemia. Their ages ranged between 18 and 50 years; males were 54 and females were only 2. Peripheral blood samples were aspirated from all patients for troponin I and DNA testing. Molecular analysis to detect 12 common cardiovascular genetic risk factors using CVD StripAssay® (ViennaLab Diagnostics GmbH, Austria) was performed
... Show MoreBackground: Lateral sinus augmentation and simultaneous insertion of dental implants is a highlypredictable procedure and associated with high rate of implants success.Aims: To evaluate implant stability changes following maxillary sinus augmentation utilizing deproteinizedbovine bone alone or mixed with platelet-rich fibrin.Materials and Methods: A total of 34 lateral sinus augmentation procedures were performed and 50 dentalimplants simultaneously installed. The lateral sinus augmentation cases were allocated randomly into 3groups: Group A comprised 13 procedures and 21 dental implants utilizing solely deproteinized bovine bone.Group B involved 10 cases and 16 dental implants using deproteinized bovine bone mixed with leukocyteand
... Show MoreThe Weibull distribution is considered one of the Type-I Generalized Extreme Value (GEV) distribution, and it plays a crucial role in modeling extreme events in various fields, such as hydrology, finance, and environmental sciences. Bayesian methods play a strong, decisive role in estimating the parameters of the GEV distribution due to their ability to incorporate prior knowledge and handle small sample sizes effectively. In this research, we compare several shrinkage Bayesian estimation methods based on the squared error and the linear exponential loss functions. They were adopted and compared by the Monte Carlo simulation method. The performance of these methods is assessed based on their accuracy and computational efficiency in estimati
... Show MoreNitrogen dioxide NO2 is one of the most dangerous contaminant in the air, its toxic gas that cause disturbing respiratory effects, most of it emitted from industrial sources especially from the stack of power plants and oil refineries. In this study Gaussian equations modelled by Matlab program to state the effect of pollutant NO2 gas on area around Durra refinery, this program also evaluate some elements such as wind and stability and its effect on stacks height. Data used in this study is the amount of fuel oil and fuel gas burn inside refinery at a year 2017. Hourly April month data chosen as a case study because it’s unsteady month. After evaluate emission rate of the all fuel and calculate exit velocity from
... Show MoreNonsteroidal anti-inflammatory drugs (NSAIDs) are drugs that help reduce inflammation, which often helps to relieve pain. In this research new ibuprofen oxothiazolidnone derivatives were synthesized from the reaction of Schiff base derivatives of Ibuprofen with mercapto acetic acid VI a-c, to improve the potency and to decrease the drug's potential side effects, a new series of 4-thiazolidinone derivatives of ibuprofen was synthesized VI a-c . The characterizations of the compounds were identified by using FTIR, 1HNMR technique and by measuring the physical properties.
In this paper, the dynamic behaviour of the stage-structure prey-predator fractional-order derivative system is considered and discussed. In this model, the Crowley–Martin functional response describes the interaction between mature preys with a predator. e existence, uniqueness, non-negativity, and the boundedness of solutions are proved. All possible equilibrium points of this system are investigated. e sucient conditions of local stability of equilibrium points for the considered system are determined. Finally, numerical simulation results are carried out to conrm the theoretical results.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More