New Schiff bases derived from D-galactose were synthesized by condensation of aldehyde (1,2:3,4-Di-O-isopropylidene-6-carboxaldehyde-α-D-galactopyranose) with different aromatic amines such as (4-bromo, 3-hydroxy, 4-iodo, 4-methoxy) aniline in dry benzene using glacial acetic acid as a catalyst. These compounds were converted to oxazepine derivatives by addition reaction with maleic anhydride in dry benzene as a solvent. The structures of the synthesized compounds have been characterized by elemental analysis, FTIR spectra, some of them by using 1HNMR spectra and measurement of its physical properties.
Aceclofenac (AC) is an orally active phenyl acetic acid derivative, non-steroidal anti-inflammatory drug with exceptional anti-inflammatory, analgesic and antipyretic properties. It has low aqueous solubility, leading to slow dissolution, low permeability and inadequate bioavailability. The aim of the current study was to prepare and characterize AC-NS-based gel to enhance the dissolution rate and then percutaneous permeability. NS.s were prepared using solvent/antisovent precipitation method at different drug to polymer ratios (1:1, 1:2, and 1:3) using different polymers such as poly vinyl pyrrolidone (PVP-K25), hydroxy propyl methyl cellulose (HPMC-E5) and poloxamer® (388) as stabilizer
... Show MorePermanent deformation, fatigue and thermal cracking are the three typical distresses of flexible pavement. Using hydrated lime (HL) into the conventional limestone mineral additive has been widely practiced, including in Europe, to improve the mechanical properties of hot mix asphalt (HMA) concrete and as the result the durability of the constructed pavement. Large number of experimental studies have been reported to find the optimum addition of HL for the improvement on HMA concrete mechanical properties, moisture susceptibility and fatigue resistance. Pavement in service is under complex thermomechanical stress-strain conditions due to coupled atmospheric and surrounding environment temperature variation and the traffic loading. To predic
... Show MoreThe aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
The research tagged: the new aesthetic in contemporary world painting. The research contained five chapters. The first chapter dealt with the research problem and its importance. It dealt with the concept of the new aesthetic as a concept concerned with the topics of the mind, i.e. the most comprehensive and diverse topics. The New Aesthetic is an aesthetic and stylistic structure whose taste, aesthetic, artistic and emotional contribute to its structure with awareness of the context. The aim of the research is to identify the new aesthetic in contemporary world painting. As for the objective limits of the research, the researcher was interested in studying the new aesthetic, especially in abstract expressionism, pop art, opera, and conc
... Show MoreThis paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreThis paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreKE Sharquie, SA Al-Mashhadani, AA Noaimi, WB Al-Zoubaidi, Our Dermatology Online/Nasza Dermatologia Online, 2015 - Cited by 10
There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
TI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show More