The interest of application of liquid membrane (pertraction) processes for recovery of medicinal compounds from dilute ammoniacal leach solutions is demonstrated. Selectivity of the liquid membrane ensures a preferential transport of the desired solute from the native extract into the strip solution, vinblastine was successfully extracted from basic media (pH 9.2) and stripped by acidic media of sulfuric acid (pH= 1.3) applying continuous pertraction in a rotating discs contactor and using n-decane as liquid membrane. Transport of vinblastine in three-liquid-phase system was studied and performed by means of a kinetic model involving two consecutive irreversible first-order reactions. The kinetic parameters (apparent rate constants of th
... Show MoreA variety of liquid crystals comprising heterocyclics 1,3,4-oxadiazol ring [III], aminooxazol [IV]a, and aminothiazol [IV]b were synthesized through a number of steps, beginning of the reaction of 3, 3'- dimethyl - [1, 1'-biphenyl] -4, 4'- diamin, ethyl monochloroacetate and sodium acetate to synthesize diacetate compound[I]. The diester reacted with hydrazine hydrate(N2H4-H2O) to give dihydrazide compound [II], then reacted with Pyruvic acid and phosphorous oxychloride to produce diketone compound [III]. The last compound was reacted with urea and thiourea to give aminooxazol and aminothiazol respectively. The synthesized compounds actually characterized and determined the structures by melting points, FT-IR and 1H-NMR spectroscopies. By u
... Show MoreTopology and its applications occupy the interest of many researching centers in the advanced world. From this point of view and because the near open sets play a very important role in general topology and they are now the research topics of many topologists worldwide and its sets doesn’t enter in fibrewise topology yet. Therefore, we use some of the near open sets to be model for introduce results and new spaces in fibrewise topological spaces. Also, there is a very important role of closure operators in constructing a topological spaces, so we introduce a new closure operators on the power set of vertices on graphs and conclusion theorems and new spaces from it. Furthermore, we discuss the relationships of connectedness between some ty
... Show MoreThe international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.
New data on jumping spiders (Salticidae) and tangle-web spiders (Theridiidae) of Armenia are provided on the basis of recently collected specimens in various regions of Armenia. One species, Ballus rufipes (Simon, 1868) is recorded as new to the Caucasus Region, in addition to the following species: Neon reticulatus (Blackwall, 1853), Pellenes brevis (Simon, 1868), Salticus scenicus (Clerck, 1757) and Synageles dalmaticus (Keyserling, 1863) that belong to a family Salticidae, are recorded in Armenia for the first time.
A further 7 species of Theridiidae are recorded in Armenia for the first time Kochiura aulica (C. L. Koch, 1838), Steatoda albomaculata (De Geer, 1778), Steatoda bipunctata (Linnaeus, 1758), Steatoda castanea Clerk, 175
Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
In this paper the research introduces a new definition of a fuzzy normed space then the related concepts such as fuzzy continuous, convergence of sequence of fuzzy points and Cauchy sequence of fuzzy points are discussed in details.
The purpose of this paper is to give some results theorems , propositions and corollaries concerning new algebraic systems flower , garden and farm with accustomed algebraic systems groupoid , group and ring.