This study was conducted to prepare protein concentrates from AL-Zahdidate’s pits by using alkaline methods where the chemical composition of the pits were (7.30, 1.04, 5.80, 8.68 and 77.19) % for each of the moisture, ash, protein, fat and carbohydrates respectively and the chemical composition of the concentrate protein was (6.62, 4.10, 26.70, 0.93, and 58.65) % respectively. The content of protein concentrate from the metallic elements (144.07, 25.11, 15.02, 0.49, 0.59, 0.27, 0.22 and 234.6) mg/ 100 g each of potassium, magnesium, calcium, iron, manganese, copper, zinc and phosphorus respectively. The results of SDS-PAGE showed five bands with weights molecular ranged between 11000-70000 Dalton. Give the biscuit which contain protein concentrate with areplacement ratio 5% significant differences in characteristics of the upper surface and the color of the pulp, while the biscuit which contain protein concentrate with a replacement ratio 10% give significant differences in the color of the pulp only . The spread ratio for each the standard biscuit and biscut which content concetrate protein with a replacement ratio (5, 10) % was (5.32, 4.67 and 4.62) respectively, and the protein percentage (8.26 and 8.72 and 9.98) and in the same order.
In this paper, the performance of a silicon cell with a Fresnel lens (FL) for building a solar photovoltaic concentrator system was evaluated; the solar concentrator is a Fresnel lens, which is a point concentrator made of polymethyl-methacrylate (PMMA) as a thin lens for the optics system.
As the radiation from the sun on the solar cell is concentrated to the levels of solar radiation of 750, 1300, 1930, 2600, 4250, 7250, and 10500) W/m2, the work was conducted at the midday in summer weather conditions, with ambient temperatures ranging 40-45 °C. The evaluation was performed in three cases; each case was conducted in succession. The performance of the cell was evaluated first wit
... Show MoreTwisted tape insertion in the smooth plain tube is one of the types of passive methods that are used to enhance heat transfer. Swirl fluid flow inside the tube and related heat transfer characteristics are very complex. ANSYS FLUENT (V 16.1) and ASPEN industrial program are used in analyzing this technique for enhancement heat transfer. A circular plain tube has length L=8534mm and 17 mm inner diameter with a twisted tape of twist ratio of y = (H/D) = (150/17) =8.8 along the plain tube were considered for this study. Eight Reynolds numbers (Re) of 784, 1000, 2000, 3000, 4000, 5000, 6000 and 7000 are used to analyze the response of thermal performance. Crude oil API 28 exit temperature, film heat transfer coefficient, Nus
... Show MoreBackground: The purpose of this study was to compare the parametric measurements of transient otoacoustic (TEOAEs) in normal hearing subjects between two clinical centers in Iraq and to examine the community effect on TEOAEs characteristics.
Patients and Methods: Transient otoacoustic emission (TEOAEs) were obtained from eighty subjects (160 ears)-males and females aged (10-20 years), with Forty (40) subjects in Baghdad audiology center and forty subjects in Sulaimania audiology center (North of Iraq)[ Kurdistan-Iraq], in standard, non-linear “Fast Screen” mode. Hearing thresholds, tympanometric, and TEOAE-parameters were recorded between two clinical center groups.
Results: The cross correlation (
Twisted tape insertion in smooth plain tube is one of types of passive methods that is used to enhance heat transfer. Swirl fluid flow inside tube and related heat transfer characteristics are very complex. ANSYS FLUENT (V 16.1) and ASPEN industrial program are used in analyzing this technique for enhancement heat transfer. A circular plain tube has length L=8534mm and 17 mm inner diameter with twisted tape has twist ratio of y = (H/D) = (150/17) =8.8 along with a plain tube were considered for this study. Eight Reynolds numbers (Re) of 784, 1000, 2000, 3000, 4000, 5000, 6000 and 7000 are used to analyze the response of thermal performance. Crude oil API 28 exit temperature, film heat transfer coefficient, Nusselt number
... Show MoreBecause of the rapid development and use of the Internet as a communication media emerged to need a high level of security during data transmission and one of these ways is "Steganography". This paper reviews the Least Signification Bit steganography used for embedding text file with related image in gray-scale image. As well as we discuss the bit plane which is divided into eight different images when combination them we get the actual image. The findings of the research was the stego-image is indistinguishable to the naked eye from the original cover image when the value of bit less than four Thus we get to the goal is to cover up the existence of a connection or hidden data. The Peak to Signal Noise Ratio(PSNR) and Mean Square Error (
... Show MoreGestational diabetes mellitus (GDM) is a complication of gestation that is characterized by impaired glucose tolerance with first recognition during gestation. It develops when ?- cell of pancreas fail to compensate the diminished insulin sensitivity during gestation. This study aims to investigate the relationship between mother adiponectin level and ?- cell dysfunction with development gestational diabetes mellitus (GDM) and other parameters in the last trimester of pregnancy. This study includes (80) subjects ( pregnant women) in the third trimester of pregnancy, (40) healthy pregnant individuals as control group aged between (17 - 42) years and (40) gestational diabetes mellitus patients with aged between (20 - 42) years. The f
... Show MoreThe security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MoreOwing to the energy crisis and pollution problems of today, investigations have concentrated on
decreasing fuel consumption and on lowering the concentration of toxic components in combustion
products by using non-petroleum, renewable, sustainable and non-polluting fuels. While conventional energy sources such as natural gas, oil and coal are non-renewable, alcohol can be coupled to renewable and sustainable energy sources.
In this study, the combustion characteristics of diesel fuel and methanol blends were compared.
The tests were performed at steady state conditions in a four-cylinder DI diesel engine at full load at
1500-rpm engine speed. The experimental results showed that diesel methanol blends provided
12.7% inc
This paper is concerned with preliminary test single stage shrinkage estimators for the mean (q) of normal distribution with known variance s2 when a prior estimate (q0) of the actule value (q) is available, using specifying shrinkage weight factor y( ) as well as pre-test region (R). Expressions for the Bias, Mean Squared Error [MSE( )] and Relative Efficiency [R.Eff.( )] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants including in these expressions. Comparisons between suggested estimators with respect to usual estimators in the sense of Relative Efficiency are given. Furthermore, comparisons with the earlier existi
... Show MoreThe intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show More