Preferred Language
Articles
/
bijps-343
Detection and isolation of flavonoids from Calendula officinalis (F.Asteraceae) cultivated in Iraq
...Show More Authors

Calendula officinalis L. (Asteraceae) known as marigold is known to have several pharmacological activities and used for the treatment of several diseases as measles, jaundice, constipation and several inflammations. Marigold flowers contain several chemical constituents mainly flavonoids, triterpenoids and essential oil. In this study marigold flowers cultivated in Iraq had been investigated for its flavonoids content. The study revealed the presence of quercetin and kaempferol glycosides and the absence of myricetin glycosides. The flowers were extracted with ethanol 70% fractionated with different solvent and the flavonoids were isolated by preparative HPLC. The isolated flavonoids were identified by measuring melting points, UV, IR, analytical HPLC and TLC.
Keywords: Marigold, Flavonoids, Kaempferol, Preparative HPLC.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Geminivirus : Detection, Diagnosis And Management
Geminiviruses occurrence in the middle east and their impact on agriculture in Iraq
...Show More Authors

View Publication
Scopus (18)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
marked as licensing oil and its role in future oil industry in Iraq
...Show More Authors

Iraq's oil industry  has been passed  in different periods , began with domination  of  Western companies to invest in Iraqi oil at twenties of the last century ,  through the process of nationalization of the shares of those companies ,  beginning of the seventies , and ending with the new policies adopted by the government recently, which was contracting with international companies to develop the oil industry , because of what the outcome of the oil industry from a decline in artistic and  physical ability as a result to the  conditions of war and embargo imposed on Iraq before 2003.

The Iraqi government has introduced licensing of a contract to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DESCRIPTION OF THE PREDATOR BUSH CRICKET, SAGA EPHIPPIGERA FISCHER VON WALDHEIM, 1846 (ORTHOPTERA, TETTIGONIIDAE) FROM ERBIL PROVINCE, KURDISTAN REGION- IRAQ
...Show More Authors

The predatory bush crickets Saga ephippigera Fischer Von Waldheim, 1846 is the largest Iraqi orthopterans and one of the most active and successful predators in the Kurdistan region. The nymphs and adults prey on all the stages of various species of insects. Twelve adult specimens were collected from Erbil Province during May 2018 and June 2021. Morphological structures of the adult insects were described and illustrated in details; important taxonomic characteristics of body regions with their appendages were chosen; and the results indicated the importance of morphological characteristics which confirmed the identification of this species correctly.

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Apr 02 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
New Record of the Species Synthesiomyia Nudiseta (van der Wulp, 1883) (Diptera, Muscidae) with Forensic Study from Kerbala City, Iraq
...Show More Authors

Publication Date
Fri Jun 20 2025
Journal Name
Bulletin Of The Iraq Natural History Museum
INVESTIGATION OF MACROFUNGI IN THE MIDDLE OF IRAQ
...Show More Authors

The study aimed to survey mushroom species from fields among herbs, palm trunks, and trees in central Iraq and to identify them on the basis of morphological and molecular characteristics. As a molecular identification result with polymerase chain reaction six species were recorded (with eight isolates): Agaricus bitorquis (Quéllt) Saccardo. 1887 (SHA14); Candolleomyces candolleanus (Fr.) D. Wächter & Melzer, 2020 (SHA15); Cyclocybe cylindracea (D.C.) Vizzini & Angelini, 2014 (SHA13); Leucoagaricus hesperius Vellinga, 2010 (SHA16); Volvariella sp. (SHA17), and Volvopluteus gloiocephalus (D. C.) Vizzini, Contu & Justo, 2011 (SHA10, SHA101 and SHA12), belonging to four families of Basidiomycetes: Agaricaceae, Pluteaceae,

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Feb 15 2023
Journal Name
Full Text Book Of Minar Congress 7
EVALUATING THE CHANGE DETECTION OF(NDVI) FOR BABYLON CITY USING REMOTE SENSING AND GIS TECHNIQUES (2015-2020)
...Show More Authors

The normalized difference vegetation index (NDVI) is an effective graphical indicator that can be used to analyze remote sensing measurements using a space platform, in order to investigate the trend of the live green vegetation in the observed target. In this research, the change detection of vegetation in Babylon city was done by tracing the NDVI factor for temporal Landsat satellite images. These images were used and utilized in two different terms: in March 19th in 2015 and March 5th in 2020. The Arc-GIS program ver. 10.7 was adopted to analyze the collected data. The final results indicate a spatial variation in the (NDVI), where it increases from (1666.91 𝑘𝑚2) in 2015 to (1697.01 𝑘𝑚2)) in 2020 between the t

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Change detection of the land cover for three decades using remote sensing data and geographic information system
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Fri Feb 20 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Early detection of periodontitis among young adult cigarette smokers and non-smokers using cone beam computed tomography
...Show More Authors

Background: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth exc

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref