The chemical composition of wastes of pressed grapes and found that the main components of wastes of pressed grapes, represented by the percentage of moisture was 6.47%, and the proportions are 3.71%. Either carbohydrates amounted to 85.77 %, either in fat models using petroleum ether Petroleum ether) was the increase of 0.27%. estimated the percentage of ash in the sampls was 3.78%, either fiber reached 69.47 %,, in addition to the test extracts towards the growth of seven types of bacteria, which included Bacillus subtilis, Bacillus cereus, Bacillus stearothermophilus, Escherishia coli, Staphylococcus aureus, Salmonella typhimurium and Pseudomonas fluorescens and yeast Candida albicans and Kluyveromyces marxianus, ( diffusion method ). Tested the effect of three transactions calories a pasteurization fast and sterilization autoclave as well as the sterilization cold as it gave extracts positive results in terms of impact inhibitory to bacteria positive and negative gram, while expressed yeast sensitivity less toward extracts.
Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (
... Show MoreThe security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show More