Preferred Language
Articles
/
SxeAO5ABVTCNdQwCjoXx
Epicatechin product of Camellia sinensis leaves detection by thin layer chromatography and high performance liquid chromatography
...Show More Authors

The current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method). Qualitative and quantitative determinations of epicatechin in two tea samples were investigated. Epicatechin identification was made by utilizing preliminary chemical tests and TLC. This identification was also boosted by HPLC and then quantified epicatechin in all ethyl acetate fractions of two tea samples. This research revealed the existence of epicatechin in black and green tea according to TLC and HPLC. The 50% aqueous ethanol was better solvent for extraction of epicatechin from leaves of tea. Quantitative estimation of epicatechin by HPLC revealed that ethyl acetate fraction of DGTAE contains the higher concentration of epicatechin than other analyzed fractions. Conclusion, tea is an excellent source of catechins particularly epicatechin that possessed various pharmacological effects.

Scopus Crossref
Publication Date
Sun Feb 28 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Intelligent System for Parasitized Malaria Infection Detection Using Local Descriptors
...Show More Authors

Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Wed Aug 25 2021
Journal Name
2021 7th International Conference On Contemporary Information Technology And Mathematics (iccitm)
Anomaly Detection in Flight Data Using the Naïve Bayes Classifier
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Mon May 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Sprite Region Allocation Using Fast Static Sprite Area Detection Algorithm
...Show More Authors

Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Photoacoustic Imaging for Tumor Detection: An in vitro Simulation Study
...Show More Authors

Photoacoustic is a unique imaging method that combines the absorption contrast of light or radio frequency waves with ultrasound resolution. When the deposition of this energy is sufficiently short, a thermo-elastic expansion takes place whereby acoustic waves are generated. These waves can be recorded and stored to construct an image. This work presents experimental procedure of laser photoacoustic two dimensional imaging to detect tumor embedded within normal tissue. The experimental work is accomplished using phantoms that are sandwiched from fish heart or blood sac (simulating a tumor) 1-14mm mean diameter embedded within chicken breast to simulate a real tissue. Nd: YAG laser of 1.064μm and 532nm wavelengths, 10ns pulse duration, 4

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Minimum Spanning Tree Algorithm for Skin Cancer Image Object Detection
...Show More Authors

This paper proposes a new method Object Detection in Skin Cancer Image, the minimum
spanning tree Detection descriptor (MST). This ObjectDetection descriptor builds on the
structure of the minimum spanning tree constructed on the targettraining set of Skin Cancer
Images only. The Skin Cancer Image Detection of test objects relies on their distances to the
closest edge of thattree. Our experimentsshow that the Minimum Spanning Tree (MST) performs
especially well in case of Fogginessimage problems and in highNoisespaces for Skin Cancer
Image.
The proposed method of Object Detection Skin Cancer Image wasimplemented and tested on
different Skin Cancer Images. We obtained very good results . The experiment showed that

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Al-nahrain Journal Of Science
Enhancing Sparse Adjacency Matrix for Community Detection in Large Networks
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Sat Apr 05 2025
Journal Name
2025 Ieee 4th International Conference On Computing And Machine Intelligence (icmi)
From Pixels to Diagnosis: AI-Powered CNN for Pneumonia Detection
...Show More Authors

View Publication Preview PDF
Scopus Crossref