Preferred Language
Articles
/
bijps-956
UPLC-ESI-MS/MS and Various Chromatographic Technique for Identification of Phytochemicals in Populus euphratica Oliv. Leaves Extract
...Show More Authors

The aim of this study is to screen the phytochemicals found in Populus euphratica leaves since this type of trees are used traditionally by many villagers as treatment for eczema and other skin disease and also this plant is poorly investigated for their phytochemicals especially in Iraq. Phytochemical screening of the extracts obtained from the n-hexane and chloroform fraction of leaves of Populus euphratica was done by Thin-layer chromatography and various spraying reagents to test if alkaloids, sterols and other compounds are present. UPLC-electrospray ionization –tandem mass spectroscopy along with GC-MS and HPTLC are used to identify the phytochemicals present in the plant leaves.UPLC-ESI-MS/MS method 20 compounds have been identified in various fractions among which are protopine alkaloids. salicin, salicortin, tremulacin. GC-MS showed that the observed data obtained are matched with that in NIST library and confirmed the presence of Hexadecanoic acid trimethylsilyl ester in 43.80% beta-Sitosterol in 37.14% and Diisooctyl phthalate 11.46%.UPLC-ESI-MS/MS is a powerful method for the identification of compounds in mixture based on comparison of their molecular, weight retention time and MS/MS fragmentation. Protopine alkaloid is identified for the first time in Populus euphratica and genus Populus. GC-MS is a valuable method for both qualification and quantification of various phytochemicals that are volatile in nature

Keywords: Populus euphratica, GC-MS, phytochemical, UPLC-ESI-MS/MS

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 16 2011
Journal Name
Alustath
The Search for Power in C. P. Snow The Light and the Dark
...Show More Authors

The Light and the Dark is the fourth novel in a series written by Charles Percy Snow where it tackles a phase of gifted scholar and remarkable individual Roy Calvert as he search for a source of power and meaning in life to relieve his inner turmoil. The character Roy Calvert is based on Snow's friend, Charles Allbery who exposes the message the character of Roy intends to convey in a certain phase of his life and the prophecy the novel carries amid catastrophe so widespread in the thirties of the twentieth century

View Publication
Publication Date
Fri Dec 01 2017
Journal Name
2017 11th Asian Control Conference (ascc)
ESO-based repetitive control for rejecting periodic and aperiodic disturbances in piezoelectric actuators
...Show More Authors

This paper presents the Extended State Observer (ESO) based repetitive control (RC) for piezoelectric actuator (PEA) based nano-positioning systems. The system stability is proved using Linear Matrix Inequalities (LMIs), which guarantees the asymptotic stability of the system. The ESObased RC used in this paper has the ability to eliminate periodic disturbances, aperiodic disturbances and model uncertainties. Moreover, ESO can be tuned using only two parameters and the model free approach of ESO-based RC, makes it an ideal solution to overcome the challenges of nano-positioning system control. Different types of periodic and aperiodic disturbances are used in simulation to demonstrate the effectiveness of the algorithm. The comparison studi

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Natural Language Processing For Requirement Elicitation In University Using Kmeans And Meanshift Algorithm
...Show More Authors

 Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jun 28 2023
Journal Name
The Iraqi Journal Of Veterinary Medicine
Hematological Parameters as Indicators for Litter size and Pregnancy Stage in Awassi ‎Ewes
...Show More Authors

Physiological status and litter size can indeed have a significant impact on ewes' ‎hematological parameters, which are essential indicators of their health. Therefore, this study ‎examined the hematological profiles of ewes during pregnancy with single and twins in the ‎Awassi ewes. The present study involved 232 ewes in good health and at sexual maturity. ‎Among them, 123 ewes had single pregnancies, while 109 ewes had twin pregnancies. The age ‎range of the ewes included in the study was between 3.5 and 4.5 years. Hematological tests ‎were conducted on the sheep's blood samples promptly following collection. The findings ‎demonstrated variations in hematological parameters among pregnant

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Monatshefte Für Chemie - Chemical Monthly
Al-, Ga-, and In-decorated BP nanotubes as chemical sensors for 2-chloroethanol
...Show More Authors

B3LYP density functional is utilized for probing the effect of decorating Al, Ga, and In on the sensing performance of a boron phosphide nanotube (BPNT) in detecting the 2-chloroethanol (CHE) molecule. We predict that the interaction of pure BPNT with CHE is physisorption, and the sensing response (SR) of BPNT is approximately 6.3. The adsorption energy of CHE is about − 26.3 to − 91.1, − 96.6, and − 100.3 kJ/mol, when the Al, Ga, and In metals are decorated on the BPNT surface, respectively. This indicates that the decorated metals significantly strength the interaction. Also, the corresponding SR meaningfully rises to 19.4, 41.0, and 93.4, indicating that by increasing the atomic number of metals, the sensitivity i

... Show More
View Publication
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Research Journal Of Pharmacy And Technology
Estimating the plain and negative tendonography techniques for evaluating injured tendon in rabbit
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Apr 11 2011
Journal Name
Icgst
Employing Neural Network and Naive Bayesian Classifier in Mining Data for Car Evaluation
...Show More Authors

In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.

Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Iraq's Position For Lebanese Civil War 1975-1976 in Iraqi and Arabian Newspapers
...Show More Authors

The research deals with Iraq's position of the Lebanese civil war and the Efforts made by Iraq in order to stop the bleeding of this war, the research also deals with the nature of regime in Lebanon and the developments that preceded the war and the positions of the internal and external competing forces, as weu as handling the Iraqi Syrian disagreement and it's impaet on the situation of Lebanon and the war developments.
The research focused on the Iraq's position towards the externd proposed solutions to solve the Lebanese civil war.

View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref