Preferred Language
Articles
/
jmracpc-46
DETECTION OF MICROBIAL CONTAMINATION IN SOME TYPES OF FLOUR THAT AVAILABLE IN LOCAL MARKETS USING BACTRAC DEVICE 3400: DETECTION OF MICROBIAL CONTAMINATION IN SOME TYPES OF FLOUR THAT AVAILABLE IN LOCAL MARKETS USING BACTRAC DEVICE 3400
...Show More Authors

A microbial study conducted for a number of flour samples (30 samples) Uses in the bakery ovens in various areas of the city of Baghdad, by used the conventional methods used in laboratories in microbial tests and compared with the modern techniqueby usedof BacTrac Device 3400 equipped from SY-LAB Impedance analysersAustrian company.The results of two ways showed (The conventional way and BacTrac Device test)that the total counts of aerobic bacteria, coliform bacteria, StaphylococcusSpp. bacteria, Bacillus cereus bacteria and yeasts and molds,Most of them were within the permissible borders in the Iraqi standard for grain and its products With free samples from SalmonellaSpp. bacteria, and that the screening by BacTrac device are shorten the time and effort in the implementation of the microbial screening process and the results obtained from it was very accurate and approach with the results obtained from conventional tests .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 05 2016
Journal Name
Al-academy
Modern technology and the possibility of their use for the development of the domestic copper industry
...Show More Authors

Industries copper a craft that requires precision and patience great in the processes of industrialization and execution of product launches brass designs and a variety of forms , and the goal of research into the possibility of the use of modern technologies in the development of industries copper local , and identifies research study models of industries copper local to the city of Baghdad , and are available in the markets for the period from (200 - 2011) , Chapter II Multi industries copper local and technical in the copper industry , and after analysis models the sample was the most important conclusions : can work forms a multi- product copper formations deep or window using the technique work motifs and patterns. - formations deco

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Partial Least Square Regression(PLSR) and Tree Regression by Using Simulation(RT).
...Show More Authors

This research discussed, the process of comparison between the regression model of partial least squares and tree regression, where these models included two types of statistical methods represented by the first type "parameter statistics" of the partial least squares, which is adopted when the number of variables is greater than the number of observations and also when the number of observations larger than the number of variables, the second type is the "nonparametric statistic" represented by tree regression, which is the division of data in a hierarchical way. The regression models for the two models were estimated, and then the comparison between them, where the comparison between these methods was according to a Mean Square

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 30 2018
Journal Name
Journal Inspector General
Some Forms of Fault Committed by Police Officers – A Comparative Study of Civil Liability under American and Iraqi Law
...Show More Authors

Police play an important role in any society. Where they maintain public order by stopping and deterring crime and bringing criminals to justice. In order to achieve these objectives, they have certain means of law (search, arrest, use of force that may be lethal in some cases). However, such means may be misused in a way that harms members of society such as (Exceeding the Scope of a search warrant, violation of privacy of individuals, False Imprisonment, Excessive use of force, Sudden Deaths in custody, Sexual Assault and Harassment, Failure to respond for Domestic violence calls), which raises the civil liability of police officers and their agencies for such damage. Police officers may even abuse their characteristics even outside offic

... Show More
View Publication
Publication Date
Fri Dec 29 2023
Journal Name
International Journal Of Nanoscience
Detection of Silica in Rice Husks Using Laser-Induced Plasma and Studying the Effect of Laser Energy on the Parameters of the Produced Plasma
...Show More Authors

This study aims to analyze the spectral properties of plasma produced from rice husk(Rh) using the laser breakdown spectroscopy (LIBS) method. The plasma generation process used the fundamental harmonic (1064 nm) of a Q-switched Nd:YAG laser. Yttrium aluminum garnet (YAG) is a man-made crystalline material. The laser fired pulses with a duration of 10 ns and a repetition rate of 6 Hz. Thus, the energy outputs achieved were 50–200 mJ at the wavelength of 1064 (nm). The silica content in the rice hulls was verified using an XRF measurement, which revealed the presence of silica in the rice hulls in a high percentage. Precise beam focusing was achieved by focusing the laser on the target material. This target material is placed with

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 28 2021
Journal Name
2021 2nd Information Technology To Enhance E-learning And Other Application (it-ela)
Pedestrian and Objects Detection by Using Learning Complexity-Aware Cascades
...Show More Authors

View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon May 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Sprite Region Allocation Using Fast Static Sprite Area Detection Algorithm
...Show More Authors

Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (4)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Neuroscience Informatics
Epileptic EEG activity detection for children using entropy-based biomarkers
...Show More Authors

View Publication
Scopus (18)
Crossref (12)
Scopus Crossref