The current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method) involved using three different solvents which are absolute ethanol, 50% aqueous ethanol and water for both extraction methods using room temperature and direct heat respectively. Crude extracts of two tea samples that obtained from two methods were fractionated by using two solvents with different polarity (chloroform and ethyl acetate). Qualitative and quantitative determinations of epicatechin in tea samples were investigated. Epicatechin identification was made by utilizing preliminary chemical tests and TLC. This identification was also boosted by HPLC and the quantity of epicatechin was determined in all ethyl acetate fractions of two tea samples. This research revealed the existence of epicatechin in black and green tea according to TLC and HPLC. Aqueous ethanol 50% was the best solvent for extraction of epicatechin from leaves of tea. Quantitative estimation of epicatechin by HPLC revealed that ethyl acetate fraction of DGTAE contains the higher concentration of epicatechin than other analyzed fractions. Conclusion, tea is an excellent source of catechins particularly epicatechin that possessed various pharmacological effects.
Abstract
The current research aims to know the reality of the research's coefficients, to know correlation and effectiveness between the organizational Agility and high performance . The current research has been applied on the official banks , including a sample of senior administration members (120) ; besides , the research has used questionnaire that being considered as the main tool for gathering information and data . It includes 59 questions in addition to the personal interviews program as to support the questionnaire and to fulfill a great deal of reality. It has been anal
... Show MoreIn this work, the effect of the addition of bright nickel plating and silver carried out by the electroplating method has been studied, on the coating of copper nanoparticles on the copper base metal via the process of thermal evaporation. The improvement of the solar absorber using CuNP in combination with the bright nickel and silver was obtained to be better than copper nanoparticles individually. A bright nickel enhanced the absorbed thermal stability. Also, other optical properties, absorptions, and emissivity slightly decreased from (93% to 87%), while the existence of silver had a slight impact on absorption of about (86.50%). On the other hand, thermal conductivity was evaluated using hot disk analyzer. The results showed a good
... Show MoreSamples of tea leaves (Green tea, Gugarate tea and Black tea used commonly in Iraq) are dried, grinded, pressed and submitted for the elemental analysis by x-ray fluorescence technique (XRF). The concentrations of major, minor and trace elements are determined. The major elements were Na, Mg, Al, K, Si, Ca, Mn, Fe, S and P. Of these elements, Ca, concentration in Gugarate tea leaves is three times, it's level in the other types of tea. Titanium, Cl, Rb and Sr are found as minor elements, while other elements such as Cu, Zn, V, Cr, Co, ...etc are found as trace elements. Of these trace elements considerable concentration values are found for some toxic elements Hg, Cd, Pb and As. Green tea contains 1.1 ppm Hg and 4.4 ppm Pb. Gugarate tea
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreIn recent years, the positioning applications of Internet-of-Things (IoT) based systems have grown increasingly popular, and are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. It can be argued that the data obtained from GPS based systems may contain error, hence taking these factors into account, the proposed method for this study is based on the application of IoT-based positioning and the replacement of using IoT instead of GPS. This cannot, however, be a reason for not using the GPS, and in order to enhance the reliability, a parallel combination of the modern system and traditional methods simultaneously can be applied. Although GPS signals can only be accessed in open spaces, GP
... Show MoreIn an attempt to disposal from nuclear waste which threats our health and environments. Therefore we have to find appropriate method to immobilize nuclear waste. So, in this research the nuclear waste (Strontium hydroxide) was immobilized by Carbon nanotubes (CNTs). The Nd-YAG laser with wave length 1064 nm, energy 750 mJ and 100 pulses used to prepare CNTs. After that adding Sr(HO)2 powder to the CNTs colloidal in calculated rate to get homogenous mixing of CNTs-Sr(OH)2. The Sr(HO)2 absorbs carbon dioxide from the air to form strontium carbonate so, the new solution is CNTs-SrCO3. To dry solution putting three drops from the new solution on the glass slides. To investigate the radi
... Show MoreThe present study aimed to try to find natural substances stimulate the production of bacteriocin, as well as "for detection of bacteriocin producing isolates. Two hundred and eighty ( 280) bacterial isolates, gram negative only, were collected from 760 different pathogenic samples, consist: (Urinary tract infection, septicemia, Vaginal inflammation and diarrhea). The isolated bacteria are: Escherichia coli, Klebsiella pneumonia Pseudomonas aeruginosa,, Salmonella typhi, Enterobacter cloacae, Acinetobacter baumannii, Serratia liquefaciens, Citrobacter freundii, Proteus mirabilis and Serrattia odorifera. Cup assay method was used to detect bacteriocin production. Loc
... Show MoreNo-fine concrete (NFC) is cellular concrete and it’s light weight concrete produced with the exclusion of sand from the concrete. This study includes the mechanical properties of lightweight reinforced by steel fiber, containing different proportions of steel fiber. This study was done using number of tests. These tests were density, compressive strength, flexural strength and absorption. These tests of the molds at different curing time. The results of tests that implication of fiber to No. fine concrete did not affect significantly on the compressive strength, While the flexural strength were gets better. Results explained that, the flexural strength of (1%) fiber No- fine concrete molds are four times that of the reference mold
... Show MoreThe present investigation considers the effect of curing temperatures (30, 40, and 50˚C) and curing compound method on compressive strength development of high performance concrete, and compares the results with concrete cured at standard conditions and curing temperature (21˚C). The experimental results showed that at early ages, the rate of strength development at high curing temperature is greater than at lower curing temperature, the maximum increasing percentage in compressive strength is 10.83% at 50C˚ compared with 21C˚ in 7days curing age. However, at later ages, the strength achieved at higher curing temperature has been less, and the maximum percentage of reduction has been 5.70% at curing temperature 50C˚ compared with 21
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More