Preferred Language
Articles
/
wWH4YZkBdMdGkNqjDCYE
Ultrasound application as a new green technology for preservation of table eggs: A review
...Show More Authors

In recent years, there has been a significant increase in research demonstrating the new and diverse uses of non-thermal food processing technologies, including more efficient mixing and blending processes, faster energy and mass transfer, lower temperature and selective extraction, reduced thermal and concentration gradients, reduced equipment size, faster response to extraction control, faster start-up, increased production, and a reduction in the number of steps in preparation and processing. Applications of ultrasound technology have indicated that this technology has a promising and significant future in the food industry and preservation, and there is a wide scope for its use due to the higher purity of final products and the elimination of undesirable sensory qualities, as well as the fact that this technology consumes only a fraction of the time and energy required compared to traditional processing and preservation methods and techniques. Therefore, ultrasound is considered a non-thermal processing and preservation technology that has the potential to be a suitable alternative to thermal food processing technologies. Ultrasound is a form of energy generated by sound waves at various frequencies too high to be detected by the human ear, i.e., frequencies above 16 kHz. Ultrasound technology has gained wider applications in food industry and enhancing the extraction of valuable compounds from vegetables and food products.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Morphological Study of Alumina Hollow Fiber Membrane
...Show More Authors

Morphologies of ceramic hollow fiber membranes prepared by a combined phase-inversion and sintering method were studied. The organic binder spinning solution containing suspended Al₂O₃ powders was spun to a hollow fiber precursor, which was then sintered at elevated temperatures( 300 ˚C, 1400 ˚C, 25 ˚C) in order to obtain the Al₂O₃ hollow fiber membranes. The spinning solution consisted of polyether sulfone (PES), N-methyl-2-pyrrolidone (NMP), which were used as polymer binder, solvent, respectively. The prepared Al₂O₃ hollow fiber membranes were characterized by a scanning electron microscope (SEM). It is believed that finger-like void formation in asymmetric ceramic membranes is initiated by hydrodynamically unstable vis

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Route Educational And Social Science Journal
A POSTMODERNIST READING OF KURT VONNEGUT’S SLAUGHTERHOUSE-FIVE
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Italian Journal Of Pure And Applied Mathematics
The non-zero divisor graph of a ring
...Show More Authors

Scopus (7)
Scopus
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Vibration Analysis of a Composite Plate with Delamination
...Show More Authors

The use of composite materials has vastly increased in recent years. Great interest is therefore developed in the damage detection of composites using non- destructive test methods. Several approaches have been applied to obtain information about the existence and location of the faults. This paper used the vibration response of a composite plate to detect and localize delamination defect based on the modal analysis. Experiments are conducted to validate the developed model. A two-dimensional finite element model for multi-layered composites with internal delamination is established. FEM program are built for plates under different boundary conditions. Natural frequencies and modal displacements of the intact and damaged

... Show More
View Publication Preview PDF
Publication Date
Wed May 31 2023
Journal Name
Iraqi Geological Journal
A Survey of Infill Well Location Optimization Techniques
...Show More Authors

The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Fol

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Historical development of Islamic jurisprudence - Develop a model
...Show More Authors

 

       Praise be to God, and prayers and peace be upon our master Muhammad, the Messenger of God, and upon his family, companions, and those who are guided by his guidance.

Then:

       Our Islamic jurisprudence and its basic principles are fixed, namely: the Noble Qur’an, then the Prophet’s Sunnah, then consensus, then analogy. However, it is characteristic of what makes it developed to meet the requirements of renewed life, including: sent interests, custom, approval, blocking pretexts, changing times. That is why it went through different stages, growth, brilliance, stagnation and endowment; Therefore, many scholars of Islamic jurisprudence divided its stages into four sections: the stage of inf

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Lung Cancer in a Sample of Iraqi Patients
...Show More Authors

Background: Lung cancer is responsible for the most
cancer deaths in both men and women throughout the
world. Deaths from lung cancer (160,440 in 2004,
according to the National Cancer Institute) exceed the
number of deaths from four other major cancers combined
(breast, colon, pancreatic and prostate).
Objective: To assess the behavior and the approaches of
lung cancer in a sample of Iraqi patients.
Methods: This descriptive retrospective study was
performed using the records of 390 patients proved to have
lung cancer that had attending the Thoracic Surgery
Department of Surgical Specialties Hospital-Medical City
\Baghdad for the period from January, 1st
, 2001 to
December, 31st
,2002.
Res

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
A Note on the Perturbation of arithmetic expressions
...Show More Authors

In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a prior

... Show More
View Publication Preview PDF
Crossref