Coffee is the most essential drink today, aside from water, the high consumption of coffee and the byproducts of its soluble industries such as spent coffee grounds can have a negative effect on the environment as a source of toxic organic compounds. Therefore, caffeine removal from the spent coffee ground can be applied as a method to limit the effect of its production on the environment. The aim of this study is to determine the kinetics and thermodynamics parameters and develop models for both processes based on the process parameters by using traditional solid-liquid extraction and Ultrasound-assisted extraction methods. The processes were performed at a temperature range of 25 to 55 °C for traditional and ultrasound baths, and
... Show MoreOne hundred and eighty five urine samples were collected eight isolates (4.3%) were obtained and diagnosed as Staphylococcus aureus. Among 8 isolates, 5 (62.5%) S. aureus isolates were found to be enterotoxigenic, most of isolates produced at least two types of Staphylococcal enterotoxins (SEs). The production of enterotoxins in the presence or absence of Thymol extracts (aqueous and alcoholic) were estimated using a reversed passive latex agglutination (SET-RPLA) kit. The extracts reduced enterotoxin production compared with the control. Enterotoxin inhibition was observed for enterotoxin C production at minimal inhibitory concentrations (MIC) at 400 µg/ml, whereas production of enterotoxins A, B, and
... Show More
Research topic: (The Epistemological Foundations for Comparison of Religions by al-Amiri)
The research sought to study the topic with: a descriptive methodology by investigating the components of al-Amiri's approach to the interfaith comparison. And analytical, by showing the applied perception of an objective model in the comparison of religions to answer two questions: What are the cognitive foundations of al-Amiri? And what is his approach to establishing an objective comparison between religions?
The research started by introducing Abu al-Hassan al-Amiri, and then presented four topics: An introduction to al-Amiri's efforts in the interfaith comparison, his knowledge foundations, an applied model
... Show MoreThis study was conducted in the plant protection department/ College of Agriculture/ University of Baghdad to evaluate the efficiency of physical agents ozone, ultraviolet radiation, microwave for destroying afla produced in corn seeds. An isolate af A.flavus producing Aflatoxin B1 was obtained from plant protection dept. college of Agric. University of Baghdad. Results showed destroy toxin AFLA B1 the effect of radiation microwave in the media of Japex degree 80 and 100 co 57.14% and 85.71%, respectively, and for 20 sec, compared to the treatment comparison 0.00% as found significant differences were apparent between transactions and the treatment of comparison, as and notes the existence of a significant dif
... Show MoreThis paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima
... Show MoreCNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.
The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show More