The increase in obesity and the many accompanying diseases is attributed to the increased production and consumption of foods made of non-nutritive sweeteners without regard to the risks of consuming additional calories, and this in turn leads to hormonal imbalance and metabolic disorders and the resulting imbalance and ill health that have spread to all segments of society. During the research, 0.01, 0.02, 0.03, 0.04 and 0.05 % of stevia sweetener was added to the cream instead of the sugar used. Physical and chemical tests were performed for the stevia extract and the microbial content in the cream, as well as the sensory evaluation. It was noted that fortifying the cream with calorie-free stevia sugar led to the production of
... Show MoreThis study was conducted to detect C.sakazakii PIF and raw milk. Two hundred samples of PIF were taken from the infected hospital infants who used this type of milk and from the local markets in addition to 16 sample of raw milk were collected. The study is the first to report the isolation of C. sakazakii and Enterobacter spp. from raw milk in Iraq. The distribution of C.sakazakii and Enterobacter spp. among the presumptive isolates using Vitek-GN2 system gave 1/16(6.25%) isolates of C.sakazakii and 4/16 (25%) isolates of Enterobacter spp. Enterobacter spp. isolates include (E.cloacae ssp. cloacae and E.cloacae ssp. dissolvens, E.hormaechei, and E.ludwigii) that isolate from raw milk Differences in between percentages of each isolate perse
... Show MoreStudied red beetle life on each of the yen and wheat durum wheat, barley, corn, rice, chickpeas, ground peanuts and beans in Living situation constant temperature and relative humidity of 65% for a period of 66 days was the life cycle of the insect different from one substance to another ....
Leuconostoc bacteria was isolated from local pickled cabbage (Brassica oleracea capitata) and identified as Leuconostoc mesenteroides by morphology,biochemical and physiological. The local isolated L. mesenteroides bacteria under the optimal conditions of dextran production showed that, the highly production of dextran was 7.7g achieved by using a modified natural media comprised of 100ml whey, 10g refined sugar, 0.5g heated yeast extract, 0.01g CaCl2, 0.001g MgSO4, 0.001g MnCl2 and 0.001g NaCl at pH 6 and 25̊C for 24 hr of fermentation and by using 1ᵡ106 cell/ml as initial inoculums volume. Some applications in food technology (Ice cream, Loaf, Ketchup and Beef preservation) have been performed with processed dextran. The result
Soils that cause effective damages to engineer structures (such as pavement and foundation) are called problematic or difficult soils (include collapsible soil, expansive soil, etc.). These damages occur due to poor or unfavorited engineering properties, such as low shear strength, high compressibility, high volume changes, etc. In the case of expansive soil, the problem of the shrink-swell phenomenon, when the soil reacts with water, is more pronounced. To overcome such problems, soils can be treated or stabilized with many stabilization ways (mechanical, chemical, etc.). Such ways can amend the unfavorited soil properties. In this review, the pozzolanic materials have been selected to be presented and discussed as chem
... Show MoreAn anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored. A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure. Pharmacological
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More