This study did the isolation, purification, and identification of the fungus Phytophthora cinnamomi of some infected plants, including Chili pepper, cucumber, and eggplant. The green parts of Pimpinella anisum plant were grounded to a semi-powdered state. Phenols, alkaloids and terpenes were extracted from this plant, then the anti-fungal activity was evaluated at different concentrations of 5% and 10%. The percentage of radial growth inhibition of fungi with plant extracts was measured after seven days of incubation. The results showed that the terpene extract was the most effective against fungi and the alkaloid extract had the least antifungal activity. the percentage of radial growth inhibition was
... Show More
The current research aims to determine the relationship of the impact of the components of the financing structure, especially financing through debts, as well as the earnings per share in the value of the shares of companies listed in the Iraq Stock Exchange. The research sample and identifying the strength of the combined effect of the ratio of financing through debt and earnings per share in maximizing The market value of the firm and the real value, as well as the variation between these relationships according to model of the real value of the companies and the market value of the research sample companies. The research community is represented by the Iraq Stock Exchange, while a conditional deliberate sample
... Show MoreCharge transfer complex formation method has been applied for the spectrophotometric determination of erythromycin ethylsuccinate, in bulk sample and dosage form. The method was accurate, simple, rapid, inexpensive and sensitive depending on the formed charge- transfer complex between cited drug and, 2,3- Dichloro-5,6-dicyano-p- benzoquinone (DDQ) as a chromogenic reagent. The formed complex shows absorbance maxima at 587 nm against reagent blank. The calibration graph is linear in the ranges of (10 - 110) μg.mL-1 with detection limit of 0.351μg.mL-1. The results show the absence of interferences from the excipients on the determination of the drug. Therefore the proposed method has been successfully applied for the determination of eryth
... Show MoreIn the present study, activated carbon supported metal oxides was prepared for thiophene removal from model fuel (Thiophene in n-hexane) using adsorptive desulfurization technique. Commercial activated carbon was loaded individually with copper oxide in the form of Cu2O/AC. A comparison of the kinetic and isotherm models of the sorption of thiophene from model fuel was made at different operating conditions including adsorbent dose, initial thiophene concentration and contact time. Various adsorption rate constants and isotherm parameters were calculated. Results indicated that the desulfurization was enhanced when copper was loaded onto activated carbon surface. The highest desulfurization percent for Cu2O/AC and o
... Show MoreBackground: Pain, swelling and trismus are the main minor complications encountered after surgical extraction of impacted third molars, minimizing these postoperative complications is the center of many studies, one proposed method is the prophylactic administration of corticosteroids, the aim of this study is to evaluate the effect of prophylactic Dexamethasone administration on facial swelling and trismus after surgical extraction of impacted third molars. Materials and methods: 20 patients were included in this study, they were randomly divided into 2 groups of 10 patients each; a study group in which patients were given 8 mg. Dexamethasone 1 hour before surgical extraction of impacted third molar and 4 mg. 6 hours postoperatively, and a
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More