After baking the flour, azodicarbonamide, an approved food additive, can be converted into carcinogenic semicarbazide hydrochloride (SEM) and biurea in flour products. Thus, determine SEM in commercial bread products is become mandatory and need to be performed. Therefore, two accurate, precision, simple and economics colorimetric methods have been developed for the visual detection and quantitative determination of SEM in commercial flour products. The 1st method is based on the formation of a blue-coloured product with λmax at 690 nm as a result of a reaction between the SEM and potassium ferrocyanide in an acidic medium (pH 6.0). In the 2nd method, a brownish-green colored product is formed due to the reaction between the SEM and phosphomolybdic acid (PMA) in a basic medium (pH 9.0). The resulting product absorbs light at λmax 750 nm. The colorimetric methods can be used either as sensors to detect the SEM by bare eye observation as little as 10 ppm and 2.0 ppm within 4−2 min or by spectrophotometry as the determination methods with linearity ranges 8.0−180 ppm and 0.5−30 ppm for the 1st and 2nd methods respectively. The developed methods were successfully applied to determine the SEM in the commercial bread products with a relative standard deviation (RSD) <3 %, <2 % and recovery of 94–103 %, 96–101 % for methods (1st and 2nd) respectively. The visual detection limits of the sensors can be used as a platform for SEM field-portable detection due to their lower limitations than the reported SEM in flour products, which opens the doors for on-site detection of SEM with instrument free.
The current study aims to determine the prevalence of Trichomonas vaginalis and Candida spp., and also to identify Candida parapsilosis and some virulence genes. It was conducted in Bint Al-Hoda Hospital of Maternity and Children in Thi-Qar province, south of Iraq for the period from the beginning of January to the end of December 2020. Two hundred and fifty samples were collected from the female genital tract for women whose age ranged between 17-50 years. Microscopic, traditional and molecular tests were used in the sample examination. The results recorded 12 (4.8%) samples infected with T. vaginalis parasite, whereas 130 (52%) samples showed Candida yeast distributed as follows: 75 (30 %) <
... Show MoreThe challenge to incorporate usability evaluation values and practices into agile development process is not only persisting but also systemic. Notable contributions of researchers have attempted to isolate and close the gaps between both fields, with the aim of developing usable software. Due to the current absence of a reference model that specifies where and how usability activities need to be considered in the agile development process. This paper proposes a model for identifying appropriate usability evaluation methods alongside the agile development process. By using this model, the development team can apply usability evaluations at the right time at the right place to get the necessary feedback from the end-user. Verificatio
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show Morewith an organized propaganda campaign. This military campaign was helped to formulate its speech by many institutions, research centers, and knowledge and intelligence circles in order to mobilize public opinion gain supporters and face the opponents by different means depending on a variety of styles to achieve its required effects.
After the US occupation of Iraq, US media fighters sought to influence the Iraqi public opinion and making them convinced them of the important presence of US military forces in Iraq which necessitated finding its justification through the use of persuasive techniques in its intensive propaganda campaigns.
This research discusses the most important
Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreThis research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreLactiplantibacillus plantarum, one of lactic acid bacteria (LAB), is found in various foods, including dairy products, meat, and vegetables, and most of these bacteria offer beneficial effects to humans and animals as potential probiotics with broad-spectrum antimicrobial activities. The aim of this study was evaluating the antibacterial efficacy of L. plantarum against some foodborne bacteria isolated from dairy products. This research involved 34 dairy products, including local and imported milk, cheese, and yogurt sold locally in Baghdad province, Iraq, during May 2022. For the isolation of L. plantarum, a special medium called MRS (de Man Rogosa and Sharpe) was applied. Colonie
... Show More