Desert truffle is considered as a type of Syrian wild fungi that spreads heavily, and it occupies important rank in folk medicine, where its aqueous extract is used for the treatment of some eye and skin illnesses, and people prefer the use of black truffle. This work interested in studying of the most available species; Terfezia claveryi (black) and Tirmania pinoyi (white). The extracts of the two species of truffle were prepared by maceration with water, methanol, and ethanol 70%. Their total phenolic contents (TPC) and total flavonoid contents (TFC) were analyzed using Folin-ciocalteu and Aluminum chloride methods respectively, and their antioxidant activities was tested using 2,2-diphenyl-1-picrylhydrazyl (DPPH) and Ferric Reducing Antioxidant Power (FRAP) methods, after microscopic examination and detection of phytochemical components. Then, phenolic profile of ethanolic 70% extract of black truffle T.claveryi was studied by using LC-MS/MS. The values of TPC were between 25.3-43.6 mg GAE/g dry extract and TFC were between 2.5-6.8 mg QE/g dry extract. The values of DPPH (IC50) and FRAP were between 5.6-9.0 mg/ml and 90.1-153.4 µmol AAE/g dry extract respectively. There is a great similarity in content and activity of two species, also the aqueous extract is similar to other extracts in content and activity, and this means that the method of extract preparation in traditional medicine is reliable. It has been predicted about 14 phenolic compounds in the extract; as p-Hydroxy benzoic acid, Syringic acid and trans-Cinnamic acid. As a result, both truffle species are a new rich resource of antioxidant compounds which are usable in nutritional, cosmetic, and therapeutic applications.
The study showed flow rates and the interaction between the settlements served by applying the model of gravity theory to measure depending on the number of the population between city Najaf and the rest of the other settlements served and using three functions of disability, time and cost, as recorded an increase in the interaction index with some settlements like them Kufa, Abbasid and Manathira, while the indicator contrast was in other settlements, either when the application of the gravity model depending on trips and socio-economic characteristics accuracy rate was more pronounced.
<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreThe performance evaluation process requires a set of criteria and for the purpose of measuring the level of performance achieved by the Unit and the actual level of development of its activities, and in view of the changes and of rapid and continuous variables surrounding the Performance is a reflection of the unit's ability to achieve its objectives, as these units are designed to achieve the objectives of exploiting a range of economic resources available to it, and the performance evaluation process is a form of censorship, focusing on the analysis of the results obtained from the achievement All its activities with a view to determining the extent to which the Unit has achieved its objectives using the resources available to it and h
... Show MoreProsthetic hands are compensatory devices for the hand amputees as a result of injury, various accidents or birth deformities, types of prosthetic hand vary depending on the mechanism they operate and how they perform. There are common types in use that are characterized by their complex mechanisms, which are difficult for the amputee to use or exclude use because of their high cost, therefore the aim of this research is to design an artificial hand that is suitable in terms of simplicity of use and low cost and similar to a natural hand with regard to dimensions and shape that operated in the mechanism of links. This research involves Stress and strain analysis of the prosthetic hand and its fingers that modelled from (Petg CR)
... Show MoreConstruction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time w
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More