Preferred Language
Articles
/
bijps-434
Phytochemical Study of Cynara scolymus L. (Artichoke) (Asteraceae) Cultivated in Iraq, Detection and Identification of Phenolic Acid Compounds Cynarin and Chlorogenic Acid
...Show More Authors

The leaves of globe artichoke, Cynara scolymus Family Asteraceae/ compositea have long – used in traditional medicine and now included in British and European Pharmacopeia, the British Harbal Pharmacopeia and complete German Commission E monographs.The plant originally comes from Mediterranean region and North Africa and cultivated around the world. The flowers are used worldwide for nutrition purposes and the leaves for medical purposes including hepatic affections. The plant wildly distributed in Iraq in the watery lines and boundary of the field.The plant contains many phytochemicals such as the bitter phenolic acids whose choleretic and hypocholestremic as these compounds are antioxidant. Other materials to have other pharmacologic effect specially flavonoids. Thus this work deals with phenolic acids cholrogenic acid and cynarin.This work includes cold extraction evaporation by freeze drying and separation inusing column chromatography, TLC and finally in High pressure liqued chromatography (HPLC), the two important compound; chlorogenic acid and cynarin were separated and identified.

Key words: Artichoke, Cynara scolymus, Poly phenolic acids, Chlorogenic acid, Cynarin.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Organizational Tactics An Approach to Strategic Agility A field study in a sample of mobile operators in Iraq
...Show More Authors

The current research dealt with the issue of organizational skillfulness as an entry point to reach strategic agility. The study has been tested in Iraq's mobile operators - Asia Cell, Zain Iraq and Cork Telecom. The study was applied to a sample of (93) managers distributed at various levels of management (board members, general managers, commissioners, department managers, people managers, unit managers, office managers). The survey used the questionnaire as a key tool for collecting data and information as well as personal interviews. It has sought to test a number of hypotheses related to correlation and influence relationships between the variables of the study, in order to answer the questions related to the problem of stud

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jun 12 2015
Journal Name
Chemistry And Materials Research
Synthesis, Physico-Chemical and Antimicrobial Activities Co(II),Ni (II) ,Cu(II), Zn(II),Cd(II) and Hg(II) MixedLigand Complexes of L- Alanine and Trimethoprim Antibiotic
...Show More Authors

The Co (II), Ni (II) ,Cu(II), Zn(II) ,Cd(II) and Hg(II) complexes of mixed of amino acid (L-Alanine ) and Trimethoprim antibiotic were synthesized. The complexes were characterized using melting point, conductivity measurement and determination the percentage of the metal in the complexes by flame (AAS). Magnetic susceptibility, Spectroscopic Method [FT-IR and UV-Vis]. The general formula have been given for the prepared mixed ligand complexes [M(Ala)2(TMP)(H2O)] where L- alanine (abbreviated as (Ala ) = (C5H9NO2) deprotonated primary ligand, L- Alanine ion .= (C5H8NO2-) Trimethoprim (abbreviated as (TMP ) = C10H11N3O3S M(II) = Co (II),Ni(II) ,Cu(II), Zn(II) ,Cd(II) and Hg(II). The results showed that the deprotonated L- Alanine b

... Show More
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Conductivity Study of DTAB in Water and Ethanol-Water Mixture in the Presence and Absence of ZnSO4
...Show More Authors

The physicochemical behaviour of dodecyltrimethylammonium bromide (DTAB) in water and ethanol-water mixture in the presence and absence of ZnSO4 were studied by measuring the conductivity at 298.15 K. The pre-micellar (S1) and post-micellar slopes (S2) were obtained and calculated the degree of dissociation (α) and the critical micelle concentration (cmc). With an increase in ethanol content, the cmc and α of DTAB increased whereas, in the presence of ZnSO4, the cmc and α decreased. By using cmc and α, thermodynamic properties as the standard free energy of micellization ( ) were evaluated. With an increase in ethanol content, the negative values of  are decreased indicating less spont

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
The relationship between social capital and knowledge sharing and their impact on improving the educational service quality: an analytical study of the views of a sample of academic staffs in the government universities in the Kurdistan Region of Iraq
...Show More Authors

Abstract

This study aims to find the relationships between social capital (social network, social trust, shared goals) and knowledge sharing (knowledge Donating, knowledge collecting) as independent variables and their impact on improving the quality of educational services (academic staffs quality, Quality of teaching methods and study curriculums). This research is an important, because it attempts to identify the relationship between social capital and the knowledge sharing and their effect on improving the quality of educational service for universities. The study problem was determined in several questions related to the nature of the correlation relationship - the impact between the different independent variables (

... Show More
View Publication Preview PDF
Crossref (1)
Crossref