The herbal remedy individually or in combination with standard medicines has been used in diverse medical treatises for the cure of different diseases. Pumpkin seed oil is one of the recognized edible oil and has substantial medicinal properties due to the presence of unique natural edible substances. Inflammation is an adaptive response that is triggered by noxious stimuli and conditions, which involves interactions amongst many cell types and mediators, and underlies many pathological processes. Unsaturated fatty acids (UFAs) can influence inflammation through a variety of mechanisms, and have been indicated as alternative anti-inflammatory agents to treat several inflammatory skin disorders. Pumpkin seed oil is rich in (UFAs), that its topical anti-inflammatory properties have been investigated. For that reason, the goal of this article was to evaluate the effects of pumpkin seed oil on acute and chronic cutaneous inflammation experimental models. The extracted pumpkin seed oil had an acceptable initial quality, when it was extracted using soxhlet extraction method and was characterized using standard methods .The physicochemical parameters of purified oil were determined. The boiling point of pumpkin seed oil was (158.90 oC) that equal to the values obtained in literature for some oil seeds, but lower than the boiling point of the oils studied, plus the melting point of pumpkin seed oil was (15.39 oC) that lead to a characteristic in cold cream manufacture. The iodine value was (104 ± 0.03 mg of KOH/g) of oil, indicated a high degree of unsaturation. The saponification value was (181± 3.2 mg KOH/g), this value indicated the pumpkin seed oil had fatty acids with higher number of carbon atoms. As a final point, the acid value was low (0.67 ± 0.09 mg KOH), while the peroxide value was low (10.03 ± 0.59 meq peroxide /kg).
In this paper we introduce a brief review about Box-Jenkins models. The acronym ARIMA stands for “autoregressive integrated moving averageâ€. It is a good method to forecast for stationary and non stationary time series. According to the data which obtained from Baghdad Water Authority, we are modelling two series, the first one about pure water consumption and the second about the number of participants. Then we determine an optimal model by depending on choosing minimum MSE as criterion.
Drilling fluid loss during drilling operation is undesirable, expensive and potentially hazardous problem.
Nasiriyah oil field is one of the Iraqi oil field that suffer from lost circulation problem. It is known that Dammam, um-Radoma, Tayarat, Shiranish and Hartha are the detecting layers of loss circulation problem. Different type of loss circulation materials (LCMs) ranging from granular, flakes and fibrous were used previously to treat this problem.
This study presents the application of rice as a lost circulation material that used to mitigate and stop the loss problem when partial or total losses occurred.
The experim
... Show MoreThis paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.
In this paper, the series solution is applied to solve third order fuzzy differential equations with a fuzzy initial value. The proposed method applies Taylor expansion in solving the system and the approximate solution of the problem which is calculated in the form of a rapid convergent series; some definitions and theorems are reviewed as a basis in solving fuzzy differential equations. An example is applied to illustrate the proposed technical accuracy. Also, a comparison between the obtained results is made, in addition to the application of the crisp solution, when theï€ ï¡-level equals one.
Attack stream cipher system , using cipher text only , depends on the characteristics of plain teKt language and the randomness of the key , that used in encryption , without having detailed k.nuwh:dgt:: uf cipher algorithm by benefiting from the balance between O's and I' in the key to reduce the probability of key space.
In this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains
Simulation experiments are a means of solving in many fields, and it is the process of designing a model of the real system in order to follow it and identify its behavior through certain models and formulas written according to a repeating software style with a number of iterations. The aim of this study is to build a model that deals with the behavior suffering from the state of (heteroskedasticity) by studying the models (APGARCH & NAGARCH) using (Gaussian) and (Non-Gaussian) distributions for different sample sizes (500,1000,1500,2000) through the stage of time series analysis (identification , estimation, diagnostic checking and prediction). The data was generated using the estimations of the parameters resulting f
... Show MoreWith the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show More