Background and Aim: The use of food dyes can cause certain diseases, such as anemia and indigestion, along with other disorders, tumors, and even cancer. Therefore, this study aimed to determine the chemical nature and toxicity of some commercial dyes locally used in processed foods compared with standard food dyes. Materials and Methods: Three types of standard and commercial food color additives (Sunset Yellow, Tartrazine, and Carmoisine) were extensively examined. The chemical structures and functional groups of the dyes were evaluated by Fourier-transform infrared (FTIR) spectroscopy. The melting temperatures of the dyes were also determined by chemical thermal analysis. The acute toxicity test to evaluate the standard and commercial food color safety was estimated by a range-finding study using 150 Wistar albino rats. Sub-groups were administered one of the three colors under study at doses of 2, 3, 4, and 5 g/kg body weight (BW) orally for 7 days. When no mortality was observed, an additional 15 g/kg BW was administered. Concerning the median lethal dose 50 (LD50), 38 rats were exploited using the up-and-down method. Results: Commercial dyes had lower melting points than standard colors. Regarding the range-finding study, rats receiving different doses of the dyes exhibited no signs of toxicity, no deaths, and no clinical or gross pathological signs throughout the 7 days of the experiment. However, the animals that were dosed with 15 g/kg BW of each dye showed signs of loss of appetite, tachycardia, drowsiness, and eventual death. The LD50 values of the commercial food dyes, particularly Sunset Yellow and Carmoisine, were lower than those of the standard dyes. Conclusion: Commercial food colors were more toxic to rats than standard food colors. Differences were observed between the purity of the standard and commercial dyes, and the latter ones contained different percentages of salt, indicating the occurrence of fraud in commercial markets. Keywords: acute toxicity, food colors, Fourier-transform infrared spectroscopy, lethal dose 50, range-finding study.
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreAbstract:
The achievement of agricultural development provide food security and to form a basis for economic growth and comprehensive social, requires a number of actions to overcome the obstacles and problems facing the development of this economic sector, to make it able to achieve food security and operation of the workforce, and reduce dependence on the outside in the provision of food peripherals, and so it is only available through the highest degree of efficiency and economic mobilization of resources, so most of the developed and developing countries alike seek to achieve sustainable agricultural development tobacco meet the food requirements and good jobs for c
... Show MoreChannel estimation and synchronization are considered the most challenging issues in Orthogonal Frequency Division Multiplexing (OFDM) system. OFDM is highly affected by synchronization errors that cause reduction in subcarriers orthogonality, leading to significant performance degradation. The synchronization errors cause two issues: Symbol Time Offset (STO), which produces inter symbol interference (ISI) and Carrier Frequency Offset (CFO), which results in inter carrier interference (ICI). The aim of the research is to simulate Comb type pilot based channel estimation for OFDM system showing the effect of pilot numbers on the channel estimation performance and propose a modified estimation method for STO with less numb
... Show MoreThe current research aims to know the method and strategy of rainstorming for students to open the door towards innovation and creativity in the field of teaching the subject of geography and the importance of brainstorming method and the studies that touched on it. The study also dealt with the steps of teaching the method of brainstorming and the most important (traditional and modern), and the difficulties of using the method of brainstorming in the teaching process, as well as explained the guidance to improve teaching using the method of brainstorming in the teaching p
... Show MoreContrary to deconstruction and its destructive pursuit, the concept of undermining the familiar seeks to refute the constants and its known limitations. It is done through the process of receiving and what is imposed by the formation of the word or text or the structural and design structure in general, along with the Arabic calligraphy in particular. This is based on the recipient's understanding and interpretation of the dual phenomenon and the content's manifestation. More accurately, the disclosure of its reality through its expressive phenomenology; for that sake, the research was devoted to studying “undermining the familiar and embodiment content in Arabic calligraphy” including four chapters. The first chapter comprised
... Show MoreThe research aims to shed light on the importance of Natural gas as a National wealth is not being used optimally to be a financial resource is important to Iraq in addition to Oil, as well as could be used as an important Source of Energy, instead of burning gas is a waste of wealth and Contribute to the contamination of the environment. Research Reviews the importance of Natural gas, where is currently about a quarter of global energy consumption. Then deals with the reality of the gas industry in Iraq and winning because of the volume of waste incineration, which reached a rate (45%) of the gas Associated with oil, where Iraq is fourth globally in Terms of the amount of gas Burned. Finally, this paper discusses the future of n
... Show MoreThe work in this research presents an experimental and a theoretical study to obtain the effect of using a low permeability geosynthetic material on the longitudinal and lateral coefficients of dispersion. This would have its effect on the contaminants migration through an isotropic, homogenous and saturated soil. The first stage of this research involves the study of the geosynthetic material and in calculating the longitudinal and lateral coefficients of dispersion for an Iraqi sandy soil by using an experimental set-up to simulate the processes. To investigate the effect of using a geosynethtic material on the dispersion coefficients, the test was conducted for each velocity that was used in the experimental work and as follows: with
... Show MoreBackground/Aim: Psoriasis is a persistent systemic disorder characterised by chronic inflammation and linked to multiple comorbidities, including arthritis, cardiometabolic disorders, obesity and hyperlipidaemia. Objective of this study was to identify the relationship of abnormal lipid profiles and psoriasis, as well as to pinpoint factors that correlate with disease severity. Methods: A cross-sectional study was carried out at the dermatology clinic over 6 months from the 1 August 2024 to the 1 February 2025. Patients aged 15 years and above with a diagnosis of psoriasis were enrolled. For each patient two sets of data were collected, demographical characteristics (age, sex, disease duration and the body mass index (BMI)) and the
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreCharge multipole Coulomb scattering form factors in 48Ca nucleus have been reproduced utilizing the theory of nuclear shell. The efficient two-body nuclear potential fpbm is considered to construct the-spin orbit term LS vectors with Harmonic Oscillator HO potential as a wave function of single particle in Fp shell. Discarded spaces ( core + higher configuration) are taken into account through the Core polarization effect by model space with accurate two-body potential of Gogny to interact the LS operating particles with the discarded space pair ( particle-hole) with energy of excitation equal to 2ћω. Gogny interaction has been selected as it had succeeded in nuclear shell theory. The computed results were compared with th
... Show More