This study was aimed to use plant tissue culture technique to induce callus formation of Aloe vera on MS. Medium supplied with 10 mg/l NAA and 5 mg/l BA that exhibit the best results even with subculturing. As the method of [1] 1g. dru weight of callus induced from A. vera crown and in vivo crown were extracted then injected in HPLC using the standards of Ascorbic acid (vit. C), Salysilic acid and Nicotenic acid (vit. B5) to compare with the plant extracts. Results showed high potential of increasing some secondary products using the crown callus culture of A. vera as compared with in vivo crown, Ascorbic acid was 1.829 ?g/l in in vivo crown and increased to 3.905 ?g/l crown callus culture . Salysilic acid raised from 3.54 ?g/l in in vivo crown and reached to 25,487? g/l and the Nicotenic acid was 19.391 mg/l and decreased to 7.438 ?g/l.
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreNumerous physiological and biochemical changes are linked to menopause. The current study was intended to examine the transforms linked to anthropometric measurements and bone-related factors. In this study of 80 women which included; they comprised 40 premenopausal women and 40 postmenopausal women. waist circumference (WC), body mass index (BMI), hip circumference (HC), moreover waist to hip ratio are among the anthropometric measurements (W-HR) recorded by standard procedures. The plasma samples were tested for the following biochemical parameters: bone-related parameters [calcium (Ca), phosphorus (P), uric acid (UA), alkaline phosphatase (ALP), and erythrocyte sedimentation rate (ESR)] and serological agglutination tests [rheumat
... Show MoreComplexes of some metal ions ( Mn(I? ) , Co(??) , Ni(??) ,Cu (??) , Zn(I?) , Cd (??) , and Hg(??) ) with 8-hydroxyquinoline (Oxine) and 2- Picoline (2-pic ) have been synthesized and characterized on the basis of their FT-IR. and Uv-visible spectroscopy ,atomic absorption molar conductivity measurements and magnetic susceptibility ,from the results obtained the following general formula has been given for prepared complexes [M (oxine)2 (2-pic)2]where M = M(??) = Mn , Co , Ni , Cu , Zn , Cd , Hg(oxine)- = ionic ligand 8-hydroxyquinolin (oxinato)(2- pic) = 2- picoline
The human being is a social being and human communication is a fundamental axis in the process of social interaction, and the characteristic of social shyness grows through the interaction of the individual with his environment. Identifying the level of shyness among university students, and identifying the differences in shyness among university students according to specialization (scientific, humanities). In order to achieve the objectives of the research, the researcher prepared a measure of shyness based on Zimbardo's theory, and the components that he identified are the (behavioral, cognitive, and emotional components). The validity and reliability were calculated using the Cronbach's alpha method, reaching (0.94), and the scale in
... Show MoreObesity is a common disease that resulted from over-nutrition in adults and children. It rarely causes damage to the centers of food in the brain. Obesity is defined as an increased body weight from its natural limit which is resulted from the accumulation of excessive amounts of fatty tissue incredibly up to 20% in males, 30 % in females unless this increase is not due to an increase in muscles as in athletes or accumulation of water in the body which is resulted from Mesothelioma or the magnitude of the skeleton.Obesity is the increase of the total average of fat in the body compared to other tissues, which causes an increasing body weight, thereby increasing body mass. The fatty child has an increase in the stored fatty layer under th
... Show MoreIn This paper, we have been approximated Grűnwald-Letnikov Derivative of a function having m continuous derivatives by Bernstein Chlodowsky polynomials with proving its best approximation. As well as we have been solved Bagley-Torvik equation and Fokker–Planck equation where the derivative is in Grűnwald-Letnikov sense.
The research aims to identify the level of psychological pollution in Iraqi society and the significant differences in psychological pollution in the Iraqi society according to variables. A sample of (600) individuals randomly selected from all governorates of Iraq, with (285) males and (315) females was used in the current study. The researcher adopted the scale of (Muhammad, 2004) psychological pollution consisting of (118) items, which limited (46) items after modification distributed into four areas: denial and abuse of the civilized identity, attachment to foreign formal aspects, effeminacy, and anarchism. The results of the research showed that there is no statistical significance among the individuals of the research sample. They
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More