Separation of Trigonelline, the major alkaloid in fenugreek seeds, is difficult because the extract of these seeds usually contains Trigonelline, choline, mucilage, and steroidal saponins, in addition to some other substances. This study amis to isolate the quaternary ammonium alkaloid (Trigonelline) and choline from fenugreek seeds (Trigonella-foenum graecum L.) which have similar physiochemical properties by modifying of the classical method. Seeds were defatted and then extracted with methanol. The presence of alkaloids was detected by using Mayer's and Dragendorff's reagents. In this work, trigonilline was isolated with traces of choline by subsequent processes of purification using analytical and preparative TLC techniques. Further identification was done by using HPLC, IR and MP. Pure Trigonelline was isolated from the seeds of Trigonella-foenum graecum excluding other alkaloid like choline. In this study, a new, fast and convenient method for isolation and purification of Trigonelline from fenugreek seeds has been established. Unlike other methods, this one excludes all the non-alkaloidal components from the fenugreek seeds extract.
E-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac
Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show MoreMercifulness is a trait of civilization, humanity, and a moral value in society, because it has an impact on social life and its role in spreading interdependence, joint liability, and solidarity among people. Mercifulness means spreading mercy, synergy, sympathy, and cooperation. Generally, a society that enjoys strong ties tends to have a kind of stability and development, as well as, is able to face the economic, political, and security crises. Conversely, a weak society leads to weak social cohesion and weak community infrastructure that is more vulnerable to social, economic, and political instability. Thus, this is the aim of the research that has used a social survey method applied to a sample of respondents who have reached (300)
... Show MoreIn this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreThe corrosion behavior of low carbon steel in washing water of crude oil solution has been studied potentiostatically at five temperatures in the range ( 303 –343 )K, at pH ( 4 ) and at pH (4,6,7,9,11 ) at (343K)..The corrosion potential shifted to more negative values with increasing temperature and the corrosion current density increased with increasing temperature, the corrosion current density (icorr) decreased with increasing pH in the rang ( 4 – 7 ) and it increased with increasing pH in the rang ( 9 – 11 ) at ( 343 K ), while the corrosion potential generally variation with increasing pH in the rang (4-11)at(343K. From the general results for this study can be seen that thermodynamic and kinetic function were
... Show MoreBackground: Saliva is one of the most important etiological host factors in relation to dental caries. It affects the carious process by its organic and inorganic constituents; in addition to its physiological functions as (flow rate, pH and buffer capacity). The aims of this study were to determine the concentrations of major elements (calcium and phosphorus) and trace elements (ferrous iron, nickel, chromium and aluminum) in saliva among a group of adolescent girls, and to explore the relation of these elements, flow rate and pH with dental caries. Material & Methods: The study group consisted of 25 girls with an age of 13-15 years old. Dental caries was diagnosed by both clinical and radiographical examinations following the criteria of
... Show More