An International Publisher for Academic and Scientific Journals The mucilage of white and black chia seeds were extracted and determining their contents of bioactive compounds such as tannins, glycosides, flavonoids, phenols, and studying their activity as anti-filamentary and anticancer. Results showed that tannins exist in white chia seeds with 35%while it is 38% in black seeds, flavonoids represent 0.98mg/ml in white chia seeds and 1.5 mg/ml for black seeds. Both kinds of seeds showed anti-filamentaryactivity, the inhibition ratio was 86.5% for white seeds and 97.3% for black seeds. Chia black seeds showed anticancer activity and the inhibition of the tumor muscle cell line ratio (GI%) was 34.8% at 50mg/ml concentration and 88.4%
... Show MoreThe letter is defined as a message directed by the sender to another party, the future. The aim is to convey, clarify or explain a particular point or subject, and in the form of direct oral communication through speech that contains a set of words and words, The future can discuss the sender directly to exchange ideas with each other, or it may be written and in this case does not require direct interaction between the matchmaker and the recipient. As a result of the different sources and topics of the discourse, and the different types of categories addressed to the speech, and the number, it has been divided into several types.
And schools of discourse analysis emerged in the early eighties of the last century and has spread and ha
Internet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.
... Show MoreRutting in asphalt mixtures is a very common type of distress. It occurs due to the heavy load applied and slow movement of traffic. Rutting needs to be predicted to avoid major deformation to the pavement. A simple linear viscous method is used in this paper to predict the rutting in asphalt mixtures by using a multi-layer linear computer programme (BISAR). The material properties were derived from the Repeated Load Axial Test (RLAT) and represented by a strain-dependent axial viscosity. The axial viscosity was used in an incremental multi-layer linear viscous analysis to calculate the deformation rate during each increment, and therefore the overall development of rutting. The method has been applied for six mixtures and at different tem
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreThe modern stylistic lesson has become more committed to the scientific limits in which it believed, and more confident in itself, and it is no longer just a scientific procedure that helps other curricula and sciences that preceded it.
Based on this, our modest research ((a stylistic vision of the objection in the Quranic discourse)) arose to explore an artistic rhetorical phenomenon that was included in the Holy Quran text. ; Because analysis is a situation that allows us to see a lot and absorb the stranger more clearly.
And since the horizontal arrangement of the linguistic elements in which stylistically undistinguished elements meet with distinct ones, the other trend has emerged that believes that the stylistic dis
... Show MoreThe definition of "prostitute" and prostitution is a difficult one and a
question over which the legislators of many lands and nations differed. A
notable feature of prostitution is its epidemic increase at times of war,
revolution and armed commotion, on account of economic, social and
psychological factors generated by such conditions of mortal conflicts. Wars
invariably deprive young wives and lovers of their men folk, resulting in
financial , sexual and emotional frustrations . At no time is the natural
balance between the sexes more seriously disturbed than during wars, when
thousands of men are thrown into one sector of the country and hundreds of
towns and villages are left to women and children only. Lo