Preferred Language
Articles
/
SxeAO5ABVTCNdQwCjoXx
Epicatechin product of Camellia sinensis leaves detection by thin layer chromatography and high performance liquid chromatography
...Show More Authors

The current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method). Qualitative and quantitative determinations of epicatechin in two tea samples were investigated. Epicatechin identification was made by utilizing preliminary chemical tests and TLC. This identification was also boosted by HPLC and then quantified epicatechin in all ethyl acetate fractions of two tea samples. This research revealed the existence of epicatechin in black and green tea according to TLC and HPLC. The 50% aqueous ethanol was better solvent for extraction of epicatechin from leaves of tea. Quantitative estimation of epicatechin by HPLC revealed that ethyl acetate fraction of DGTAE contains the higher concentration of epicatechin than other analyzed fractions. Conclusion, tea is an excellent source of catechins particularly epicatechin that possessed various pharmacological effects.

Scopus Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of The College Of Education For Women
Preparation Scale father control when junior high students
...Show More Authors

The family found itself confused any of the methods of dealing (Control - democracy) follow to reach the best level in education, what was favorite yesterday about a father dealing with his children control which showed generations characterized by high levels of self-esteem and decision-making, today rejected and opposed it. As some believe that a sense of control generates a negative represented by fear and frustration.
Find the goal of preparing the current scale of the father control when junior high students.
To achieve this goal, has been preparing a tool to measure the father control after that, the researcher extract the validity and reliability of the scale, and then applied to a sample of 500 students from junior high sch

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 10 2025
Journal Name
Journal Of Optics
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Design and construction of anair pollution detection system using a laser beam and absorption spectroscopy
...Show More Authors

Air pollution is one of the important problems facing Iraq. Air pollution is the result of uncontrolled emissions from factories, car exhaust electric generators, and oil refineries and often reaches unacceptable limits by international standards. These pollutants can greatly affect human health and regular population activities. For this reason, there is an urgent need for effective devices to monitor the molecular concentration of air pollutants in cities and urban areas. In this research, an optical system has been built consisting of aHelium-Neonlaser,5mWand at 632.8 nm, a glass cell with a defined size, and a power meter(Gentec-E-model: uno) where a scattering of the laser beam occurs due to air pollution. Two pollutants were examin

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
CALCULATION OF EXCESS MOLAR VOL-UMES OF SOME TERNARY LIQUID MIX-TURES AT 303.15 K
...Show More Authors

Excess molar volumes of five ternary mixtures of 2- methoxy ethanol(1) +butyl acetate(2)+benzene(3), +toluene(3), +chlorobenzene(3), +bromobenzene(3), and +nitrobenzene(3) have been measured at 303.15K. The excess molar volume exhibited positive deviation over the entire range of composition in the systems 2-methoxy ethanol(1)+ butyl acetate(2)+ benzene(3),+toluene(3) and sigmoid behavior in the case of the remaining systems. Flory's statistical theory have been extended to predict the excess molar volumes of the five ternary mixtures at 303.15 k over a wide range of composition . An excellent agreement has been found between the experimental and theoretical excess molar volumes , both in magnitude and sign .

View Publication Preview PDF
Publication Date
Thu Jul 25 2019
Journal Name
Journal Of Plant Protection Research
First report of phytoplasma detection on sand olive, cowpea and alfalfa in Iraq
...Show More Authors

View Publication Preview PDF
Scopus (19)
Crossref (2)
Scopus Crossref
Publication Date
Sat Aug 30 2025
Journal Name
Iraqi Journal Of Science
Seroprevalence and Molecular Detection of Human Parvovirus B19 in Beta Thalassemia Major Patients
...Show More Authors

Beta thalassemia major (BTM) is a genetic disorder that has been linked to an increased risk of contracting blood-borne viral infections, primarily due to the frequent blood transfusions required to manage the condition. One such virus that can be transmitted through blood is the Human Parvovirus B19 (B19V). The aim of this study was to investigate the frequency and molecular detection of B19V. This study included 60 blood donors as controls and 120 BTM patients. B19V was identified by serology, which measured B19-IgG and B19-IgM antibodies. Nested Polymerase Chain Reaction (nPCR) was employed to target the VP1/VP2 structural proteins. The results showed that B19V seropositivity represents 27.5% (33 out of 120) in BTM patients, and

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Detection of Some Active compounds and Vitamins Increasing in Aloe vera Callus culture
...Show More Authors

This study was aimed to use plant tissue culture technique to induce callus formation of Aloe vera on MS. Medium supplied with 10 mg/l NAA and 5 mg/l BA that exhibit the best results even with subculturing. As the method of [1] 1g. dru weight of callus induced from A. vera crown and in vivo crown were extracted then injected in HPLC using the standards of Ascorbic acid (vit. C), Salysilic acid and Nicotenic acid (vit. B5) to compare with the plant extracts. Results showed high potential of increasing some secondary products using the crown callus culture of A. vera as compared with in vivo crown, Ascorbic acid was 1.829 ?g/l in in vivo crown and increased to 3.905 ?g/l crown callus culture . Salysilic acid raised from 3.54 ?g/l in in vivo c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Computer Networks, Big Data And Iot
A Comprehensive Study of Various DC Faults and Detection Methods in Photovoltaic System
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
COMPARATIVE STUDY FOR EDGE DETECTION OF NOISY IMAGE USING SOBEL AND LAPLACE OPERATORS
...Show More Authors

Many approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good

... Show More
View Publication Preview PDF