Flavonoids were extracted from Zizyphus spina-christi leaves by Ethyl acetate after acid digested and used as antioxidant. The dried extract was added separately to each sample of fat extracted from hallow cow and sheep bones as follows: T1 cow fat, T2 control for cow fat, T3 sheep fat and T4 control for sheep fat (the control T2 and T4 reffered to samples without added antioxidant).
Samples were stored at -18, 5, 25 and 55 °C for 28 days. The storage trials were conducted at -18, 5 and 25 °C for 28 days for T1, T2, T3 and T4. The chemical indices examined initially and at the end of storage period. PVs was 1.46, 1.46, 1.8 and 1.8 meq/ Kg oil respectively, FFA values were 0.245, 0.245, 0.244 and 0.244% respectively and TBA values were 0.015, 0.015, 0.023 and 0.023 mg malonaldehyde/ Kg oil respectively. The statistical analysis for the obtained results revealed insignificant differences (p< 0.05) among both storage periods and storage temperatures. It was also found that the added antioxidants (Zizyphus leaf) hadn't showed preservative effect on added fat samples.
The storage trial for fat samples were also conducted at 55°C for 28 days. The initial values for PVs were 1.46, 1.46, 1.8 and 1.8 meq/ kg oil respectively and the final values were 3.2, 4.4, 3.6 and 5.4 meq/ kg oil respectively. The FFAs values were initially 0.245, 0.245, 0.244 and 0.244% respectively and the final values were 0.394, 0.507, 0.451 and 0.564% respectively. The TBA values were initially 0.015, 0.015. 0.023 and 0.023 mg malonaldehyde/ kg oil respectively and the final values were 0.02, 0.032, o.o334 and o.o452 mg malonaldehyde/ kg oil respectively. The statistical analysis revealed insignificant differences p< 0.05 among storage periods for both PV and FFA values (except T1 that didn't show significant effect p< 0.05 for FFA) and TBA values. The added antioxidants (Zizyphus leaf) hadn't revealed significant effect on stored oil samples as reflected by obtained results.
The caliphs of Tukalti Able III (Tiglath-pileser) sustained their extension and enclosure strategy whom they were highly talented with outstanding potentialities. They performed their political plan of extinguishingthe ambitions of the upper class and the internal uprisings. The Assyrian Kingdom, in the eighth century BC reached to the highest degree of expansion that no other ancient Iraqi kingdom had reached It dominated the whole near eastbut it did not have absolute command due to the subsequent uprisings that out bursted in the regions attached to the kingdom near the borders.
هدفت الدراسة التعرف على الضغوط النفسية والخوف من المستقبل لدى أمهات أطفال طيف التوحد، بلغت عينة الدراسة )60( ام لديهن طفل توحدي، تم استخدام المنهج الوصفي التحليلي وبعد تطبيق مقياسي الدراسة ومعالجة البيانات احصائيا توصلت الدراسة ان األمهات لديهن درجة عالية من الضغوط النفسية ودرجة عالية من الخوف حول مستقبل اطفالهن، وفي ضوء نتائج الدراسة خرجت الباحثة ببعض التوصيات والمقترحات.
The research endeavored to single out the problems, difficulties and obstacles faced by the members of the staff of Baghdad University. The importance of research, then, depends upon the importance of the university lecturers and their vital role in developing the society. The goals of the research are summarized in knowing the main problems facing those university lectures and relative weight of these problems in addition to identifying the differences in their opinions to these problems according to the specializations variables (scientific, humanistic), the gender (males, females) and the Scientific grade (professor, assistant professor, lecturer, assistant lecturer.
The research is limited
... Show MoreThis study aimed to discover the reality of the teacher's maintainced of order and classroom management from the perspective of teachers themselves.
A social survey with an introduce sample that consist (180) male and female teachers from the provinces of Ajloun and Jerash in 2008-2009. To achieve the objective of the study was developed for this purpose and the results have shown the existence of statistically significant differences in marinating order and the management of class and in favor of females, the results also showed Statistically significant differences regarding the academic qualification and for the benefit of holders of master degrees and more compared to those with bachelor's degree.
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreAbstract\
Dealing economic units at the present time with an industrial environment characterized by competitiveness and the pace of change and its strength as a result of this changing environment shall be on those who made it to adopt strategies that allow them to confront these variables and work in order to meet the market requirements of quality and price appropriate products to suit and the demand for those products and conditions to maintain
its competitive position and its development.
As a result, it became the subject of competitiveness in recent years and enjoys widespread attention at the global level. And in order to keep up
... Show MoreThe aim of the study is to diagnose the real level of technology usage in teaching and learning EFL at university from teachers and students’ viewpoints, and see if it is possible to achieve something of the researchers’ dream - accessing top universities. Two questionnaires have been used to measure the range of technology usage in Colleges of Education for Women, Baghdad and Iraqi Universities, and College of Basic Education. The results have shown that the reality of using technology is still away from the dream. The results have been ascribed to two reasons: The first is the little knowledge of using technology in teaching, and the second is that technology is not included in the curriculum.
Gender mainstreaming is a goal for building a society characterized by justice and equality. Gender mainstreaming requires a clear understanding of the concept. Therefore, the research focuses on the concept of gender and how it was addressed in the literature through which the concepts related to gender were extracted which is represented by the role and social status through which the relationship of gender can be measured. In order to find out the basis for the different status and roles of both sexes in societies, the interpreted theories of gender were addressed, through which the most important factors affecting gender relations, such as biological, social and economic factors, as well as political systems, were discussed. Due to t
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show More