The extraction of Basil oil from Iraqi Ocimum basillicum leaves using n-hexane and petroleum ether as organic solvents were studied and compared. The concentration of oil has been determined in a variety of extraction temperatures and agitation speed. The solvent to solid ratio effect has been studied in order to evaluate the concentration of Ocimum basillicum oil. The optimum experimental conditions for the oil extraction were established as follows: n-hexane as organic solvent, 60 °C extraction temperature, 300 rpm agitation speed and 40:1mL:g amount of solvent to solid ratio.
The banking system considered as one of the most important intermediate circle between creditor and debtors it is mean the most important funding rings in economic activity, whether finance takes the a consumer or investment form and therefore it is the main base to stimulate economic activity both on the demand side, both consumption and investment and therefore of the main motivating factors for economic growth.
The banking system depends in achieve its goals on the grants and loan recovery, or what is known credit process and according to what the importance referred to the role of the banking system, it is important to ensure the safety and efficiency of the mechanisms of banking device and safety is
... Show MoreThe analysis of the classic principal components are sensitive to the outliers where they are calculated from the characteristic values and characteristic vectors of correlation matrix or variance Non-Robust, which yields an incorrect results in the case of these data contains the outliers values. In order to treat this problem, we resort to use the robust methods where there are many robust methods Will be touched to some of them.
The robust measurement estimators include the measurement of direct robust estimators for characteristic values by using characteristic vectors without relying on robust estimators for the variance and covariance matrices. Also the analysis of the princ
... Show MoreThe research study includes shedding light on the sas dance in Iraq, as it is one of the popular legacies that are rich in the Mesopotamian civilization and because of the different practices it has in the different occasions on which these dances are held. Which is one of the kinetic arts widespread among the classes of Iraqi society. The researcher explained its features and artistic content that characterizes Iraqi music. The (methodological framework) reviewed the justification, importance and purpose of the research, and the limits of the research that included the (National Troupe of Folk Art) as a human limit to discover the artistic methods of the Sas dance and then define the terms of the search. The "theoretical framework" cont
... Show MoreA simulation study is used to examine the robustness of some estimators on a multiple linear regression model with problems of multicollinearity and non-normal errors, the Ordinary least Squares (LS) ,Ridge Regression, Ridge Least Absolute Value (RLAV), Weighted Ridge (WRID), MM and a robust ridge regression estimator MM estimator, which denoted as RMM this is the modification of the Ridge regression by incorporating robust MM estimator . finialy, we show that RMM is the best among the other estimators
In this study, we investigate the behavior of the estimated spectral density function of stationary time series in the case of missing values, which are generated by the second order Autoregressive (AR (2)) model, when the error term for the AR(2) model has many of continuous distributions. The Classical and Lomb periodograms used to study the behavior of the estimated spectral density function by using the simulation.
In this research, some robust non-parametric methods were used to estimate the semi-parametric regression model, and then these methods were compared using the MSE comparison criterion, different sample sizes, levels of variance, pollution rates, and three different models were used. These methods are S-LLS S-Estimation -local smoothing, (M-LLS)M- Estimation -local smoothing, (S-NW) S-Estimation-NadaryaWatson Smoothing, and (M-NW) M-Estimation-Nadarya-Watson Smoothing.
The results in the first model proved that the (S-LLS) method was the best in the case of large sample sizes, and small sample sizes showed that the
... Show MoreThe main object of the current work was to determine the antifungal efficiency of secondary metabolites product called synephrine that extracted from Citrus sinesis peels and the ability of synephrine to biosynthesis gold nanoparticles from HAucl4 which consider environmentally favourable method, then determine their activity against pathogenic human dermatophyte. The identification of synephrine done by Thin layer chromatography (TLC), High Performance Liquid Chromatography (HPLC) and The Fourier Transform Infrared (FTIR). The characterization of gold nanoparticles by using Ultra Violet-Visible Spectroscopy (UV-Vis), Field – Emission Scanning Electron Microscopy (FESEM) and Fourier Transform Infrared (FTIR), confirmed the biosynt
... Show MoreArcHydro is a model developed for building hydrologic information systems to synthesize geospatial and temporal water resources data that support hydrologic modeling and analysis. Raster-based digital elevation models (DEMs) play an important role in distributed hydrologic modeling supported by geographic information systems (GIS). Digital Elevation Model (DEM) data have been used to derive hydrological features, which serve as inputs to various models. Currently, elevation data are available from several major sources and at different spatial resolutions. Detailed delineation of drainage networks is the first step for many natural resource management studies. Compared with interpretation from aerial photographs or topographic maps, auto
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More