Calendula officinalis L. (Asteraceae) known as marigold is known to have several pharmacological activities and used for the treatment of several diseases as measles, jaundice, constipation and several inflammations. Marigold flowers contain several chemical constituents mainly flavonoids, triterpenoids and essential oil. In this study marigold flowers cultivated in Iraq had been investigated for its flavonoids content. The study revealed the presence of quercetin and kaempferol glycosides and the absence of myricetin glycosides. The flowers were extracted with ethanol 70% fractionated with different solvent and the flavonoids were isolated by preparative HPLC. The isolated flavonoids were identified by measuring melting points, UV, IR, analytical HPLC and TLC.
Keywords: Marigold, Flavonoids, Kaempferol, Preparative HPLC.
Background: Toxin-producing Shiga Escherichia coli has been identified as a new foodborne pathogen that poses a significant health risk to humans. Shiga toxin-producing Escherichia coli can be found in raw cow milk and its derivatives. A small number of Escherichia coli strains that produce shiga toxin are pathogenic. Aim of study: The study aimed to see if there were any virulence genes in 50 milk samples that were typical of Entero-haemorrhagic E. coli and evaluate the Myrtus communis effects on these bacteria. Materials and Method: Milk samples were used to isolate E. coli bacteria (n= 27), biochemically analyzed, and genetically screened for virulence genes using a multiplex (PCR). The hydro-alcoholic extraction of Myrtus communis leave
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreFinding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreIn the light of what is witnessing in the advertising arena of new ways and methods in delivering advertising message to consumers by finding new outlets to communicate with them especially through social networking sites, which became the first choice of advertising companies in order to spread its goods and services. These companies now are relying gradually on celebrities to appear with their products and goods to drive the audience's attention towards them. The thesis aims to find out the attitudes of young people towards the the advertisements that show famous celebrities on social networking sites. The researcher used survey method which aims to record, analyze and interpret the phenomenon after collecting the necessa
... Show More This research aims to estimate stock returns, according to the Rough Set Theory approach, test its effectiveness and accuracy in predicting stock returns and their potential in the field of financial markets, and rationalize investor decisions. The research sample is totaling (10) companies traded at Iraq Stock Exchange. The results showed a remarkable Rough Set Theory application in data reduction, contributing to the rationalization of investment decisions. The most prominent conclusions are the capability of rough set theory in dealing with financial data and applying it for forecasting stock returns.The research provides those interested in investing stocks in financial
... Show MoreAI in teaching English is reshaping language learning. While interest in AI-supported education is growing worldwide, research in this area is still emerging in Iraq. This review synthesizes empirical AI-based intervention studies to enhance English language learning in Iraqi higher education, and the perceptions of stakeholders regarding AI tools in language instruction. The reviewed intervention studies, comprising studies employed different AI platforms to support grammar instruction, speaking fluency, writing feedback, and pragmatic competence. These interventions yielded improvements in learners’ performance, motivation, and communicative confidence. In parallel, perception-focused studies revealed positive attitudes toward A
... Show MoreSocial risks posed a great challenge to the development path in Iraq, which resulted in widening the development gaps, whether these gaps were between rural and embargoed areas, or between Iraqi governorates, and the gender gap. Besides, the nature of the reciprocal relationship between the social risks and the development process requires the adoption of development trends that are sensitive to the risks that take upon themselves the prompt and correct response to these risks, away from randomness and confusion that Iraq suffered from for decades. However, currently, the situation has differed a great deal. This is because the size and types of such gaps have widened and become more complicated than before; a matter which has led to hav
... Show More