Separation of Trigonelline, the major alkaloid in fenugreek seeds, is difficult because the extract of these seeds usually contains Trigonelline, choline, mucilage, and steroidal saponins, in addition to some other substances. This study amis to isolate the quaternary ammonium alkaloid (Trigonelline) and choline from fenugreek seeds (Trigonella-foenum graecum L.) which have similar physiochemical properties by modifying of the classical method. Seeds were defatted and then extracted with methanol. The presence of alkaloids was detected by using Mayer's and Dragendorff's reagents. In this work, trigonilline was isolated with traces of choline by subsequent processes of purification using analytical and preparative TLC techniques. Further identification was done by using HPLC, IR and MP. Pure Trigonelline was isolated from the seeds of Trigonella-foenum graecum excluding other alkaloid like choline. In this study, a new, fast and convenient method for isolation and purification of Trigonelline from fenugreek seeds has been established. Unlike other methods, this one excludes all the non-alkaloidal components from the fenugreek seeds extract.
In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This paper deals with constructing mixed probability distribution from mixing exponential
In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe purpose of this paper is to introduce and study the concepts of fuzzy generalized open sets, fuzzy generalized closed sets, generalized continuous fuzzy proper functions and prove results about these concepts.
This paper concentrates on employing the -difference equations approach to prove another generating function, extended generating function, Rogers formula and Mehler’s formula for the polynomials , as well as thegenerating functions of Srivastava-Agarwal type. Furthermore, we establish links between the homogeneous -difference equations and transformation formulas.
Background: Entamoeba histolytica is the causative agent of amoebic dysentery and hepatic abscesses. Despite the efficacy of metronidazole in alleviating infectious diseases, the global dissemination of drug-resistant parasites raises the possibility that Punica granatum could serve as an effective natural alternative treatment. Objective: To evaluate the effect of P. granatum methanolic and aqueous extracts of various parts against E. histolytica trophozoites in an in vitro setting. Methods: Various concentrations (0.14, 0.7, 1.4, and 2.8 mg/ml) of P. granatum extracts of the flowers, leafs, peels, and seeds were chosen for this purpose. A culture medium containing 0.05x106/ml E. histolytica trophozoites was treated with different
... Show MoreAn experimental investigation of natural convection heat transfer from an isothermal horizontal,vertical and inclined heated square flat plates with and without circular hole, were carried out in two cases, perforated plates without an impermeable adiabatic hole "open core" and perforated plates with an impermeable adiabatic hole "closed core" by adiabatic plug. The experiments covered the laminar region with a range of Rayleih number of (1.11x106 ≤RaLo≤4.39x106 ), at Prandtle number (Pr=0.7). Practical experiments have been done with variable inclination angles from horizon (Ф=0o ,45o,90o,135oand 180o),facing upward (0o≤Ф<90o), and downward (90o
≤Ф<180o). The results showed that the temperature gradient increases whi
The current world seeks to supply the most of the fruits of human knowledge and tries hard to search for the most important scientific facts, programs, means and advanced devices in various fields, including the sports field, and among these means is the use of various and advanced training devices and programs for the purpose of achieving the desired goal, which is to reach the desired level, the basketball game is one of the sports that need high technology in training according to scientifically studied principles because it is one of the games that relate to the abundance of its variables, composition and speed of change, all of which require a technical and high training depth and the players ’possession of different physical charact
... Show More