Campsis grandiflora (Bignoniaceae) is a fast growing deciduous climber, the dried flowers have been used as a carminative, blood tonic, and febrifuge in Chinese traditional medicine. This plant has an anti-inflammatory, anti-oxidant, anti-depressant, and anti-bacterial effect; with a beneficial role in stagnant blood and endometriosis conditions. In this study, the detection of beta-sitosterol in the hexane extract of Iraqi C.grandiflora flowers was performed using thin layer chromatography (TLC) and high performance liquid chromatography(HPLC); while the isolation done by preparative layer chromatography then structure elucidation of isolated compound was done by FTIR and 1HNMR. Furthermore, assessment of the anti-oxidant activity of the ethyl acetate extract of Iraqi C.grandiflora flowers using three different methods and total flavonoid content, then measuring the pearson’s correlation coefficient between these methods. The results showed that the hexane extract of Iraqi C.grandiflora flowers contain beta-sitosterol compound and the ethyl acetate extract of this plant possesses an excellent anti-oxidant effect using the single-electron transfer (SET) pathway in scavenging the free radicals, and this activity attributed to the potent antioxidant i.e. polyphenols.
Tourist business organizations face a challenging and the risks dynamic environment reflected its impact on the community and generate extra under pressure in the responsibilities and burdens of exceptional and affected much of factors, accidents and risks as a result of the actions and attitudes of disasters variety may exceed the geography of States border, which requires the absorption of risks facing the tourism and how to manage and deal with them scientific and reasonable grounds for the diagnosis and treatment of risk and how to reduce the aggravation and the different kinds.
As risks affecting the most important and vital to organizations as a tourist aspects of the market share and styles tourist
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
Abstract
The current study presents numerical investigation of the fluid (air) flow characteristics and convection heat transfer around different corrugated surfaces geometry in the low Reynolds number region (Re<1000). The geometries are included wavy, triangle, and rectangular. The effect of different geometry parameters such as aspect ratio and number of cycles per unit length on flow field characteristics and heat transfer was estimated and compared with each other. The computerized fluid dynamics package (ANSYS 14) is used to simulate the flow field and heat transfer, solve the governing equations, and extract the results. It is found that the turbulence intensity for rectangular extended surface was larg
... Show MoreThe aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreIn this paper, we investigate the connection between the hierarchical models and the power prior distribution in quantile regression (QReg). Under specific quantile, we develop an expression for the power parameter ( ) to calibrate the power prior distribution for quantile regression to a corresponding hierarchical model. In addition, we estimate the relation between the and the quantile level via hierarchical model. Our proposed methodology is illustrated with real data example.
The other day in the Holy Quran and the four Gospels
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show More