The antioxidant and antibacterial activities of ethanolic extract and phenolic compounds extract of Lemon balm (Melissa officinalis) and Oregano (Oreganum vulgare) plants were studied; the phenolic content and the relationship between these compounds and the above activities were also investigated. The results showed that the Lemon balm had the highest phenolic content (56.5% mg g) and the phenolic content of Oregano was twice lower than Lemon balm. Lemon balm has the highest antioxidant activity which causes lipid peroxidation inhibition activity of linoleic acid (90.5%), this activity was more than ?-tocopherole antioxidant activity (79.3 %). It was found that the main source of antioxidant activity of these plants was belonging to phenolic compounds and the results proved the strong relationship between antioxidant activity and phenolic content. The ethanolic extract of Lemon balm was exhibited strong antibacterial activity ,the inhibition included all bacterial isolates , with highest inhibition zone against Bacillus cereus ( 26 mm), while Oregano did not exhibit clear antibacterial activity, Aeromonas hydrophila was the most resistant isolate . It was obvious from the results of effect of phenolic compounds on bacteria that no relationship between antibacterial activity and phenolic content and the inhibition may be due to other compounds.
This study was aimed to director wheat production's technical efficiency grown under two irrigation systems(fixed and pivot sprinkler irrigation systems)using random border analysis.Samples were collected randomly from267farmers from Salah Al-Din Governorate/Iraq.The samples were divided into two groups;187farmers used a pivot sprinkler irrigation system with three categories of possession(80,60and120dunums),while the other group used a fixed sprinkler irrigation system with four categories of possession(40,30,20and10dunums).Transcendent production function was used to study the effect of production factors on wheat yield. The results indicated that the mechanization work and the amount of added irrigation water increased by 1% whil
... Show MoreAbstract
In this work, diabetic glucose concentration level control under disturbing meal has been controlled using two set of advanced controllers. The first set is sliding mode controllers (classical and integral) and the second set is represented by optimal LQR controllers (classical and Min-, ax). Due to their characteristic features of disturbance rejection, both integral sliding mode controller and LQR Minmax controller are dedicated here for comparison. The Bergman minimal mathematical model was used to represent the dynamic behavior of a diabetic patient’s blood glucose concentration to the insulin injection. Simulations based on Matlab/Simulink, were performed to verify the performance of each controll
... Show MoreThis study presents the effect of laser energy on burning loss of magnesium from the holes' drilled in aluminum alloy 5052. High energy free running pulsed Nd:Glass laser of 300 µs pulse duration has been used to perform the experiments. The laser energy was varied from 1.0 to 8.0 Joules, The drilling processes have been carried out under atmospheric pressure and vacuum inside a specially designed chamber. Microhardness of the blind drilled holes has been investigated .The results indicated that the magnesium loss could be manipulated by adjusting the focusing conditions of the laser beam. Almost, the obtained holes were free of cracks with low taper and low sputter deposition. .The holes performed under atmospheric conditions have high
... Show MoreTwo- dimensional numerical simulations are carried out to study the elements of observing a Dirac point source and a Dirac binary system. The essential features of this simulation are demonstrated in terms of the point spread function and the modulation transfer function. Two mathematical equations have been extracted to present, firstly the relationship between the radius of optical telescope and the distance between the central frequency and cut-off frequency of the optical telescope, secondly the relationship between the radius of the optical telescope and the average frequency components of the modulation transfer function.
Gas lift is one of the artificial lift techniques which it is frequently implemented to raise oil production. Conventionally, the oil wells produce depending on the energy of reservoir pressure and solution gas which declines due to continuous production. Therefore, many oil wells after a certain production time become unable to lift oil to the surface. Thus, the continuity of production requires implementation of gas lift which works to decrease the average fluid density in the tubing by injection gas through the annulus into the tubing. This paper aims to get maximum oil production of an Iraqi giant oil field at optimum injected gas rate. The field is located in south of Iraq and in
Mass transfer has been studied at rotating cylinder electrodes fabricated with spiral-wound woven-wire meshes using reduction of copper as a test reaction. The experimental data were correlated by an empirical expression between the Sherwood number and the Reynolds number, both regarding the hydraulic diameter as a characteristic length. It was found that the Sherwood number was dependent upon the Reynolds number to the power of 0.521. An enhancement factor was adopted to compare the efficiency of the new rotating cylinder electrode with previous three-dimensional rotating cylinder electrodes. The results showed that the new type has a mass-transfer enhancement factor 2.3 times higher than those obtained with smooth rotating cylinder electr
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More