The current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method). Qualitative and quantitative determinations of epicatechin in two tea samples were investigated. Epicatechin identification was made by utilizing preliminary chemical tests and TLC. This identification was also boosted by HPLC and then quantified epicatechin in all ethyl acetate fractions of two tea samples. This research revealed the existence of epicatechin in black and green tea according to TLC and HPLC. The 50% aqueous ethanol was better solvent for extraction of epicatechin from leaves of tea. Quantitative estimation of epicatechin by HPLC revealed that ethyl acetate fraction of DGTAE contains the higher concentration of epicatechin than other analyzed fractions. Conclusion, tea is an excellent source of catechins particularly epicatechin that possessed various pharmacological effects.
This research investigated the importance and priorities of the project overhead costs in Iraq via a questionnaire using the fuzzy analytic hierarchy process technique (FAHP). Using this technique is very important in the uncertain circumstances as in our country. The researcher reached to frame an equation through the results of the priorities of weights include the percentages of each of the main items of the project overhead costs. The researcher tested this equation by applying it to one of the completed projects and the results showed suitability for the application. The percentages of the (salaries, grants, and incentives) and (fieldwork requirements) in equation represent approximately two-thirds of project overhe
... Show MoreAbstract: non-alcoholic fatty liver disease (NAFLD) is one of the widespread chronic liver diseases; it is ranging from simple fat buildup in the liver (steatosis) to non-alcoholic steatohepatitis (NASH) presence of inflammation and hepatocyte injury. &nb
... Show MoreBreast cancer is the most diagnosed form of malignant tumour in Iraqi women. Tamoxifen and trastuzumab are highly effective adjuvant therapy for breast cancer. This study's objectives were to define the patient's belief in tamoxifen or trastuzumab when used as adjuvant therapy and to determine the variation in belief between the two medications in a sample of Iraqi breast cancer patients. The cross-section survey was conducted using the BMQ-Specific questionnaire. Ninety-seven participants (sixty-seven tamoxifen, thirty trastuzumab) participated in this study. The mean of specific-necessity scale for tamoxifen was (3.7) and for trastuzumab (4). The findings showed a high necessity for both medicines, and there were
... Show MoreCoronary artery disease (CAD) is the leading cause of death worldwide. Certain genetic polymorphisms play an important role in this multifactorial disease, being linked with increased risk of early onset CAD.
To assess six genetic polymorphisms and clinical risk factors in relation to early onset nondiabetic Iraqi Arab CAD patients compared to controls.
This case–contro
This study seeks to identify the possibility of achieving the property of faithful representation of accounting information and measure it by using the standard approach based on mathematical and statistical equations by comparing two financial periods before and after the application of (IFRS-15) Revenue from contracts with customers, during the period. (2014-2018), for the financial statements of the mixed joint stock companies listed on the Iraq Stock Exchange, which is one of the main pillars of the economic structure of the country, as a joint investment between the state and the private sector, and has importance in many aspects, including support for projects of public companies, S Absorption and employment of labor, as well as ra
... Show Moren this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show Moreيهدف البحث الى دراسة وتحليل الهندسة المتزامنة (CE) وتحسين التكلفة(CO)، واستعمال مخرجات الهندسة المتزامنة كمدخلات لتحسين التكلفة، وبيان دور الهندسة المتزامنة في تحسين جودة المنتوج، وتحقيق وفورات في وقت التصميم والتصنيع والتجميع وتخفيض التكاليف، فضلاً عن توظيف بعض النماذج لتحديد مقدار الوفورات في الوقت ومنها نموذج(Lexmark) ونموذج (Pert) لتحديد الوفورات في وقت التصميم وقت لتصنيع والتجميع. ولتحقيق اهداف
... Show MoreThe expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show More