The current study included the separation of three alkaloid compounds from Anastatica Hierochuntica and studied the effect of the these compounds on cancerous cells , specifically liver cancer it was found that compound number one is the most influential or inhibiting at 50 percent followed by compound number three when using concentration of 400 μg/mL.
Abstract
The term public budget defects became nowadays a chronic, economical phenomenon, almost all the countries weather advanced or development country suffered from it, despite the different visions to economic schools of a thought to accept or reject the deficit in public budget but the prevailed opinion that is needed to rule the role of the state by reducing the public spending which led to continuous deficits in public budget and the consequent upon increase in government borrowing, increase taxes on income and wealth, thus weakening the in contrive for private investment which contributed to the increase of in flationary stagnation, it became a duty to state covered by the lack of financial sources
... Show MoreThe purpose of this paper is to recognize the impact of database levels on fields of banking service (provision of remittance services and transfer of funds, save financial deposits, provision of personal loans services) in some of Iraqi banks using one-way multivariate analysis of variance. The paper population consisted of (120) employees, then a random stratified sample of (104) employees was taken. A questionnaire paper consists of (24) items were designed in order to analyze by one-Way multivariate analysis of variance (MANOVA) using SPSS.One of the main findings of the current paper is that there is an impact of database on fields of banking service in Iraqi banks (Al Rafidain and Al Rasheed).
The research aims to determine what a photograph intends to convey as a visual text. Photographs are not captured randomly, especially those of politicians. Each photograph carries a message, even if interpretations of that message vary from person to person. The research adopts a methodology based on semiotic analysis, applying Laurent Gervero's model to analyze a photograph of the Iraqi Prime Minister Mustafa Al-Kadhimi's visit to Fallujah on the anniversary of the victory over ISIS. The photographs in question constitute a visual language built upon a sequence of iconic symbols and signs. These elements coalesce to give rise to an image centered around a particular theme, one designed to convey a precise messag
... Show MoreThis article proposes a new strategy based on a hybrid method that combines the gravitational search algorithm (GSA) with the bat algorithm (BAT) to solve a single-objective optimization problem. It first runs GSA, followed by BAT as the second step. The proposed approach relies on a parameter between 0 and 1 to address the problem of falling into local research because the lack of a local search mechanism increases intensity search, whereas diversity remains high and easily falls into the local optimum. The improvement is equivalent to the speed of the original BAT. Access speed is increased for the best solution. All solutions in the population are updated before the end of the operation of the proposed algorithm. The diversification f
... Show MoreCrop production is reduced by insufficient and/or excess soil water, which can significantly decrease plant growth and development. Therefore, conservation management practices such as cover crops (CCs) are used to optimize soil water dynamics, since CCs can conserve soil water. The objective of this study was to determine the effects of CCs on soil water dynamics on a corn (
Classification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE), Border
... Show MoreLanguage is an important means through which one can construct one's social world. Accordingly, the way we view ourselves and the world is basically formed by language use whereby identities, relations, and values are constructed and maintained. Most discourse analysts consider narrative not only the locus of construction and enactment of identity, but also a distinguished genre for its analysis.The present study is concerned with how identity can poetically be informed, hence exploring the way black poets use language when reflecting their identity and culture. The poem, right on: white america by the black American poetess Sonia Sanchez, is chosen to be analyzed based on Simpson's stylistic model (2004). In this model, the ana
... Show MoreThe presence of different noise sources and continuous increase in crosstalk in the deep submicrometer technology raised concerns for on-chip communication reliability, leading to the incorporation of crosstalk avoidance techniques in error control coding schemes. This brief proposes joint crosstalk avoidance with adaptive error control scheme to reduce the power consumption by providing appropriate communication resiliency based on runtime noise level. By switching between shielding and duplication as the crosstalk avoidance technique and between hybrid automatic repeat request and forward error correction as the error control policies, three modes of error resiliencies are provided. The results show that, in reduced mode, the scheme achie
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show More