The current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method). Qualitative and quantitative determinations of epicatechin in two tea samples were investigated. Epicatechin identification was made by utilizing preliminary chemical tests and TLC. This identification was also boosted by HPLC and then quantified epicatechin in all ethyl acetate fractions of two tea samples. This research revealed the existence of epicatechin in black and green tea according to TLC and HPLC. The 50% aqueous ethanol was better solvent for extraction of epicatechin from leaves of tea. Quantitative estimation of epicatechin by HPLC revealed that ethyl acetate fraction of DGTAE contains the higher concentration of epicatechin than other analyzed fractions. Conclusion, tea is an excellent source of catechins particularly epicatechin that possessed various pharmacological effects.
<span lang="EN-US">We are living in the 21<sup>st</sup> century, an era of acquiring necessity in one click. As we, all know that technology is continuously reviving to stay ahead of advancements taking place in this world of making things easier for mankind. Technology has been putting his part in introducing different projects as we have used the field programmable gate arrays (FPGAs) development board of low cost and programmable logic done by the new evolvable cyclone software is optimized for specific energy based on Altera Cyclone II (EP2C5T144) through which we can control the speed of any electronic device or any Motor Control IP product targeted for the fan and pump. Altera Cyclone FPGAs’ is a board thro
... Show MoreThe most important recommendations of this research are:-
1.The benefit of the other countries experiences about the transparency of the government performance, without depending on the transparency that imitating the other experiences; that may not fit with the Iraqi government units.
2.The Ministry of Finance has to prepare the citizen guidebook about the government performance which is considered an essential document, it should be simple and available for all the parties of relation; and for not specialized citizen for the purpose of simplifying the understanding of government performance details.
3.The benefit of the government units websites of inte
... Show MoreBatch reactive distillation was studied in packed bed column. Esterification of methanol with acetic acid to produce methyl acetate and water with homogenous sulfuric acid as a catalyst was considered. This system was chosen because the reaction is reversible and the boiling point of reactant and products are different.
The reaction was carried out with and without distillation column and shows that the reactive distillation is more efficient from the conventional process (reactor and then separation). The conversion of acetic acid and concentration of methyl acetate increase by (30.43% and 75.14%) respectively at the best condition (reflux ratio 2, feed mole ratio 2 and batch time 90 minute).
The influence of various parameters, s
The luxury of the grace and the extension of the vioa of the subjects that attract two teams of opinion,
Addame
QF Faba believes that
Meet
.
And poverty is the best in human life, and others see it
And Joe titling
Grace, and not for man to suffer as long as stigmatized and
Try not to have money.
And in recent years
G
F
S
A lot of people bypassing
.
I see who says austerity in
Thou shalt not see grace
Color of and
Luxury has been promoted to the religious life of
M
A lounge
And others, and a team of worshipers to distance themselves from the mantle of turquoise,
Faleh me
I was looking at this part because I did not
.
See my opinion
Insurance Companies perform a prominent role in providing services and bolstering national economy, and they contribute in achieving the aims of the economic development plans in addition to many other social and economic benefits. So it is necessary to evaluate the activity of these companies continuously to define performance level and its nature. Financial analysis is one of the important instruments that helps in analyzing and explanation of data in such a way that enable administration to define performance level and diagnosing strength and weakness points. This study tackles the state of affairs of the Iraqi Insurance Company which is considered as one of the active national institutions, due to its distinguished role in collecting
... Show MoreBeyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More
