The results shows existence of metals such as copper, iron, Cadmium, lead and zinc in most of examined samples , the highest concentration are up to (2.26, 40.82, 282.5, 31.02, 19.26, 4.34) Part per million) ppm) in pasta hot (Zer brand), Indomie with chicken, granule (Zer brand), brand (Zer brand), and rice (mahmood brand) respectively, with presence nickel in spaghetti( Zer brand), granule, Zer brand with concentration reached to 4.34 ppm and 1.06 ppm respectively.
The results of cereals group and its products show that two kinds of fungi, Aspergillus spp. and Penicillin spp. were found in rice (Mahmood brand) with numbers got to 1.5×103 Colony Forming Unit/ gram (c.f.u./g),while Bacillus cereus and Staphylococcus aureus were isolated from Spaghetti (Zer brand) with numbers got to 2×102, and 4×102, c.f.u/g ,and Clostridium Perfringens and Escherichia coli were from pasta (Zer brand),with numbers got to 1×10, 6×102 c.f.u/g, it was noticed that bulgur (Zer brand) was polluted with penicillium spp., and the number of yeasts and molds got to 1.5×103 c.f.u./g.
It was found that Escherichia coil and Staphylococcus aureus are found in pasta (Zer brand) with numbers got to 1×10, and 6×102 g/c.f.u, in addition to Aspergillus spp., the numbers of Bacillus subtitus and Escherichia coil, which polluted granule(Zer brand) 1.1×10 and 5×102 c.f.u/g as well as Aspergillus spp.The number of yeasts and molds in Indomie with chicken got to 1.1×102 c.f.u/g and fungus, Aspergillus spp., was also isolated from it.
We have presented the distribution of the exponentiated expanded power function (EEPF) with four parameters, where this distribution was created by the exponentiated expanded method created by the scientist Gupta to expand the exponential distribution by adding a new shape parameter to the cumulative function of the distribution, resulting in a new distribution, and this method is characterized by obtaining a distribution that belongs for the exponential family. We also obtained a function of survival rate and failure rate for this distribution, where some mathematical properties were derived, then we used the method of maximum likelihood (ML) and method least squares developed (LSD)
... Show MoreBackground: Molars and premolars are considered as the most vulnerable teeth of caries attack, which is related to the morphology of their occlusal surfaces along with the difficulty of plaque removal. different methods were used for early caries detection that provide sensitive, accurate preoperative diagnosis of caries depths to establish adequate preventive measures and avoid premature tooth treatment by restoration. The aim of the present study was to evaluate the clinical sensitivity and specificity rates of DIAGNOdent and visual inspection as opposed to the ICDAS for the detection of initial occlusal caries in noncavitated first permanent molars. Materials and Methods: This study examined 139 occlusal surface of the first permanent
... Show MoreIn this work Different weight of pure Zinc powder suspended particles in 4ml base engine Oil were used.
Intensity of Kα Line was measured for the suspended particles ,also for mixture which consist from Zinc particle blended with Engine base Oil. Calibration Curve was drawn between Ikα line Intensity and Zinc concentration at different operation condition. The Lower Limit detection (LLD) and Sensitivity (m) of Spectrometer were determined for different Zinc Concentration (Wt%). The results of LLD and m for Samples were analyzed at Operation Condition of 30KV,17mA is best from Samples were analyzed at Operation Condition of 25KV,15mA
Dust storms are typical in arid and semi-arid regions such as the Middle East; the frequency and severity of dust storms have grown dramatically in Iraq in recent years. This paper identifies the dust storm sources in Iraq using remotely sensed data from Meteosat-spinning enhanced visible and infrared imager (SEVIRI) bands. Extracted combined satellite images and simulated frontal dust storm trajectories, using the Hybrid Single Particle Lagrangian Integrated Trajectory (HYSPLIT) model, are used to identify the most influential sources in the Middle East and Iraq. Out of 132 dust storms in Iraq during 2020–2023, the most frequent occurred in the spring and summer. A dust source frequency percentage map (DSFPM) is generated using ArcGIS so
... Show MoreThe research dealt with a comparative study between some semi-parametric estimation methods to the Partial linear Single Index Model using simulation. There are two approaches to model estimation two-stage procedure and MADE to estimate this model. Simulations were used to study the finite sample performance of estimating methods based on different Single Index models, error variances, and different sample sizes , and the mean average squared errors were used as a comparison criterion between the methods were used. The results showed a preference for the two-stage procedure depending on all the cases that were used
Objective(s): To assess the eating habits of adolescent females with iron deficient anemia.
Methodology: This study employed a quantitative research, descriptive evaluation design.The study was carried out on adolescent girls attending Kirkuk secondary school, period from 11 April to 27 December 2022. A non- probability (Purposive) sample has been applied to obtain the study goals. The study sample was (62) student who participate in the study.
Results: Pre-test results from the study revealed that 54.8% of students had moderate IDA. While the students' iron levels returned to normal in the posttest (53.2%). The majority of students (59.7%) had poor eatin
... Show Moreبعض المعادلات في اشكالية الانتخابات العراقية
The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreThis study investigated the prevalence of quinolones resistance proteins encoding genes (qnr genes) and co-resistance for fluoroquinolones and β-lactams among clinical isolates of Klebsiella pneumoniae. Out of 150 clinical samples, 50 isolates of K. pneumoniae were identified according to morphological and biochemical properties. These isolates were collected from different clinical samples, including 15 (30%) urine, 12 (24%) blood, 9 (18%) sputum, 9 (18%) wound, and 5 (10%) burn. The minimum inhibitory concentrations (MICs) assay revealed that 15 (30%) of isolates were resistant to ciprofloxacin (≥4µg/ml), 11 (22%) of isolates were resistant to levofloxacin (≥8 µg/ml), 21 (42%) of isolates were re
... Show MoreSeeds, beans, leaves, fruit peel and seeds of five plants (Ferula assa-foetida, Coffea robusta, Olea europaea, Punica granatum and Vitis vinifera, respectively) were extracted with four solvents (distilled water, 80% methanol, 80% acetone and a mixed solvent that included methanol, ethanol, acetone and n-butanol at proportions 7:1:1:1). Such manipulation yielded 20 extracts, which were phytochemically analyzed for total polyphenols (TP) and flavonoids (TF). The DPPH (2,2-diphenyl-1-picrylhydrazyl) radical scavenging activity (RSA) and DPP-4 (dipeptidyl peptidase-4) relative inhibition activity (RIA) were also assessed for each extract. The results revealed that mixed solvent extract of V.
... Show More