Ubikh is one of the most important tribes of the Northwest Caucasus and has a long history. Naturally, rebukes are an integral part of the Caucasus region. Their people were able to confront the Russian invasion of their lands like the rest of the Caucasus tribes to defend their existence, freedom and the right to build their independent state, but they were not able to resist the great Russian military progress they achieved on all sides. For the territory that belonged to Persia and the Ottoman Empire and ended the resistance of the Meridian movement in the Northeast Caucasus, the Russians left only the weak resistance of the tribes of the Northwest Caucasus led by the rebuke after Russia managed to eliminate all resistance movements i
... Show MoreThe Necessity of College of Education for Woman from the Point of view of Students
Free radicals are reactive compounds, their excessive production is considered to be an important cause of oxidative damage in biomolecules causing degenerative diseases. Polyphenols are one of the most important groups of secondary metabolites of plants, which have an antioxidant activity depending on their properties as hydrogen donors. Echinops polyceras Boiss. (Asteraceae) is one of Echinops genus species that spread in Syria, Lebanon, and Palestine. Phytochemicals found in this species leaves have been extracted with gradient polarity solvents, and primary screening of the secondary metabolites was established. The phenolic compounds and flavonoids contents were determined. The free radicals scavenging act
... Show MoreAbstract:
In light of globalization and internationalization of financial markets, issues arising from financial crises have become increasingly serious and fundamental, creating a lot of debate among experts around the world. So, many studies have attempted to investigate what measures can be taken to detect and prevent crises before they devastate the economies.
Therefore, this paper examines the Effectiveness of the Monetary Policy (MP) to Avoid, Reduce or Treat the Financial Crisis in Malaysia. Scholars have yet to agree on the issue
... Show MoreThis study aimed to isolate and identify Cryptococcus species from three distinct sources: sputum samples of pigeon fanciers, dried pigeon droppings, and eucalyptus tree leaves. A total of 150 specimens were collected over a two-month period, comprising 50 samples each from human sputum, pigeon droppings collected across various areas of Baghdad, and eucalyptus leaves obtained from the Baghdad College of Veterinary Medicine. All samples were cultured on Sabouraud dextrose agar supplemented with chloramphenicol and incubated at 25°C for 2–3 days. From the initial cultures, 20 isolates presumptively identified as Cryptococcus spp. were obtained: 6 isolates (12%) from human sputum, 9 isolates (18%) from pigeon droppings, and 5 isol
... Show MorePiroxicam is a non-steroidal anti-inflammatory drug (NSAID) used in the treatment of musculo-skeletal and joint disorders. The problem with this drug is its poor solubility in water and hence poor bioavailability after oral administration. In order to improve its solubility and dissolution behavior, hydrophilic additives such as starch, lactose, superdisintegrants including crospovidone (C.P), cross carmellose sodium (CCS), and sodium starch glycolate (SSG) were physically dry mixed with the drug by simple trituration. The improvement in the solubility in 0.1 N HCl was obtained as the amount of starch or lactose increased in the physical mixture, while for superdisintegrants, they further improve the solubility when they are present in s
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More