Preferred Language
Articles
/
hheMi5IBVTCNdQwCVbRV
Isolation, characterization and quantification of a pentacyclic triterpinoid compound ursolic acid in Scabiosa palaestina L. distributed in the north of Iraq
...Show More Authors

Ursolic acid (UA, 3 ?-hydroxy-urs-12-en-28-oic acid) are isomeric triterpenic acids. The high quantities of pentacyclic triterpenoids in Scabiosa species seems to be obvious and there is an evidence that most of pentacyclic triterpenoids that have been isolated are saponins. This is one of the most important characteristic of the genus Scabiosa, the main aglycones are ursolic acid and oleanolic acid. In the current study, isolation from the aerial part and roots of Scabiosa palaestina L. was performed using Preparative HPLC. Furthermore, detection and quantitation of ursolic acid was performed by high performance thin layer chromatography (HPTLC). The identification of isolated triterpenoid involves two methods including FT-IR coupled with LC-MS/MS that have been used for the simultaneous determination of the isolated UA. Quantitative analysis of Ursolic acid content in chloroform fractions revealed that both of the aerial parts and roots contain comparable concentration of 0.052 and 0.054 mg/ml respectively. The FT-IR and LC-MS/MS spectra of the isolated compound shows good agreement with those reported in literatures of Ursolic acid. Quantitative concentration of UA in chloroform fraction revealed that aerial parts and roots contain comparable concentrations and the spectral data for the isolated unknown were in good agreement with those reported in literature of UA.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
A Proposed Algorithm for Encrypted Data Hiding in Video Stream Based on Frame Random Distribution
...Show More Authors

     The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Sensors
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
...Show More Authors

Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost

... Show More
View Publication Preview PDF
Scopus (35)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
A stuy Some physical properties for play (vunyl alcohol) in aquecous solution at four temperatures
...Show More Authors

The densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1

View Publication Preview PDF
Publication Date
Sun Jun 05 2022
Journal Name
Network
A Computationally Efficient Gradient Algorithm for Downlink Training Sequence Optimization in FDD Massive MIMO Systems
...Show More Authors

Future wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment
...Show More Authors

     In the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jul 18 2020
Journal Name
College Of Islamic Sciences
provisions 0f the special young man in marriageability: provisions 0f the special young man in marriageability
...Show More Authors

This research –paper tack les some of matters relating to marriageability of the young man who has not attained discretion. the aim of this study is to highlight the religious precepts concerned. the religious missive to this effect reads; ''all praise be to Allah ,lord of the world ;I witness that  there is no god but Allah, the sole and only, to him all creation is attributed. He taught man with pen, and all that he does not know, so exalted is he, and I witness that Mohammed is his servant and messenger, the master of all messengers and the seal of all prophets who was entrusted with a message of march to all mankind. May the blessings of Allah be to him, his household and companions. Until the day of Judgement. "this missive i

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 25 2021
Journal Name
Journal Of Recent Activities In Architectural Sciences
The Electrical Shanshool to revive Al-Shanasheel in the traditional urban scene in hot dry areas
...Show More Authors

One of the functions of Al-Shanasheel was to cool the air, but they could not compete with the Evaporative coolers, As Al-Shanasheel were a sign of luxury and wealth in Arab societies and were only built in homes of wealthy families, they are more expensive than the evaporative coolers, depending on the level of the decoration and the sculpting used to create them aesthetically, where People replaced them with evaporative coolers for their low cost, and higher cooling efficiency. One of the reasons for the disappearance of Al-Shanasheel is the absence of the functional need for them, in exchange for the high cost of construction. The diminished role of Al-Shanasheel in the contemporary urban scene, although they are one of the most

... Show More
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Babylonian Woman As Heroine In Dekker’s Drama: The Babylonian Woman As Heroine In Dekker’s Drama
...Show More Authors

Abstract
The present research paper provides an analysis of Thomas Dekker’s
exaltation of the figure of the Babylonian woman as a tragic heroine in his dramatic
art. The paper falls into two sections. The first section outlines the deliberate
mispresentation of the figure of the Babylonian woman in the Bible and the
misreading of that figure. The second section reveals Dekker’s rectification of the
distorted image of the Babylonian woman, whom he defends and glorifies as a
heroine and a victim of misinterpretation and conspiracy.

View Publication Preview PDF
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
A Blended Learning Program Based on the Next Generation Standards (NYS) to Develop the Teaching Performance of Middle School Mathematics Teachers and Some Students’ Future Thinking Skills
...Show More Authors

Abstract

The aim of the current research is to prepare an integrated learning program based on mathematics standards for the next generation of the NYS and to investigate its impact on the development of the teaching performance of middle school mathematics teachers and the future thinking skills of their students. To achieve the objectives of the research, the researcher prepared a list of mathematics standards for the next generation, which were derived from a list of standards. He also prepared a list of the teaching competencies required for middle school mathematics teachers in light of the list of standards, as well as clarified the foundations of the training program and its objectives and the mathematical

... Show More
View Publication Preview PDF