Preferred Language
Articles
/
bsj-3175
Determination of Nicotine Extracted from Eggplant and Green Pepper by HPLC
...Show More Authors

Nicotine was separated from eggplant and green pepper seeds (Solanaceous) by High Performance Liquid Chromatography (HPLC).The concentration of nicotine in the eggplant extract (0.871-0.877 μg/ml) was determined by injecting standard material with 0.5 and 1.5 μg/ml, while the concentrations of nicotine in green pepper extract (0.613-0.618 μg/ml) was determined when the standard material was injected with 0.5 and 1.5 μg/ml. The qualitative chemical data was calculated from derivations of the standard material. Nicotine concentration was measured qualitatively in both extracts through the calibration curve and method of the standard addition. This technique has high accuracy and compatibility, bringing the proportion of relative recovery percentage of nicotine extracted from eggplant seeds to 95.880-103.104% and relative error of -4.119-3.104%. Relative recovery percentage   of nicotine extracted from green pepper seeds was 97.284 -103.518 % and relative error was -2.716-3.518%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 15 2019
Journal Name
Alustath Journal For Human And Social Sciences
A Developmental-Longitudinal Study of Request External Modifiers in Authentic and Elicited Data
...Show More Authors

View Publication
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Comparison Study between Iraqi Conditions of Contract and FIDIC Conditions- The Red Book
...Show More Authors

Reconstruction in Iraq requires coherent legitimate frameworks that are able to detail obligations, rights and responsibilities of the parties participating in reconstruction projects, regardless their type or delivery system.
Conditions of Contract can be considered an important component of these frameworks. This paper investigates flexibility and appropriateness of the application of Iraqi conditions of contract in reconstruction projects. These conditions were compared to FIDIC Conditions. The objective wasn't comparing individual clauses, but rather exploring the principles and philosophy laying behind each conditions, and to what extent each conditions care about realizing equity between main contract parties. Validity of applic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
Optical patterns and aesthetic values in the halls of events: رواء مصطفى خلف
...Show More Authors

current research Cares about study patterns of optical and aesthetic values in the halls of occasions (weddings) because of their importance in providing an atmosphere of joy. The problem was through the study of light and its impact on the receiver and found a researcher that interior spaces allocated to the halls inappropriate in terms of functional and aesthetic so necessitated the need to study this phenomenon in order to be addressed through the study of light and its impact on the users of those spaces where research aims to current detection properties patterns optical in the internal spaces of the halls and identify some of the aesthetic values of the lighting for the interior spaces.The search consists of four chapters, the firs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Journal Of Sustainable Studies
The Scope of Resorting to Amicus Curiae at the Regional and International Levels
...Show More Authors

The amicus curiae is one of the judicial procedures adopted in many judicial and legal systems around the world, under which a person who is not a party to the case, and without having a personal and direct interest in it, intervenes to draw the court’s attention to many factual and legal aspects

Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Some Non-destructive Testing for Al metal in 0.1N of NaCl and NaOH
...Show More Authors

In this work the corrosion behavior of Al metal was studied by using non- destructive testing (NDT), which is a noninvasive technique for determining the integrity of a material. The ultrasonic waves was used to measure the corrosion which occur by two corrosive medium (0.1N sodium chloride and 0.1N sodium hydroxide) and study the corrosion by weight-loss method and electrochemical method in addition to performance the microscopic inspection for the samples before and after the immersion in the corrosive medium. Corrosion parameters were interpreted in these media which involve corrosion potential (Ecorr) and corrosion current density (icorr). The results indicate that both

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Notes on Traces of a Symmetric Generalized (?, ?)-Biderivations and Commutativity in Prime Rings
...Show More Authors

Let R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Materials Chemistry And Physics
Investigation of silica polymorphs stratified in siliceous geode using FTIR and XRD methods
...Show More Authors

View Publication
Crossref (58)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
New White Method of Parameters and Reliability Estimation for Transmuted Power Function Distribution
...Show More Authors

        In this paper, an estimate has been made for parameters and the reliability function for Transmuted power function (TPF) distribution through using some estimation methods as proposed new technique for white, percentile, least square, weighted least square and modification moment methods. A simulation was used to generate random data that follow the (TPF) distribution on three experiments (E1 , E2 , E3)  of the real values of the parameters, and with sample size (n=10,25,50 and 100) and iteration samples (N=1000), and taking reliability times (0< t < 0) . Comparisons have been made between the obtained results from the estimators using mean square error (MSE). The results showed the

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
State-of-the-Art in Data Integrity and Privacy-Preserving in Cloud Computing
...Show More Authors

Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak

... Show More
View Publication Preview PDF
Crossref (7)
Crossref