Reducing of ethyl 4-((2-hydroxy-3-methoxybenzylidene)amino)benzoate (1) afford ethyl 4-((2-hydroxy-3-methoxybenzyl)amino)benzoate (2). Reaction of this compound with Vilsmeier reagent affords novel 2-chloro-[1,3] benzoxazine ring (3). The corresponding acid hydrazide of compound 3 was synthesized from reaction of compound (3) with hydrazine hydrate. Newly series of hydrazones (5a–i) were synthesized from reaction of acid hydrazide with various aryl aldehydes. Antibacterial activity of the hydrazones was secerned utilizing gram-negative and gram-positive bacteria. Compound (5b) and (5c) exhibited significant antibacterial ability against both gram-negative and gram-positive bacteria, while the compounds (5a) showed mild antibacterial activity. Compounds (5d–i) did not display notable activity. The molecular docking of synthesised compounds were tested inside the pocket of bacterial gyrase enzyme target site by using MOE 2015 software, which acts as Adenosine triphosphate (ATP)-binding domain bacterial gyrase enzyme pocket and novobiocin was used as reference.
APDBN Rashid, The College of Arts/ Al-Mustansiriyya University, 2004
Essential approaches involving photons are among the most common uses of parallel optical computation due to their recent invention, ease of production, and low cost. As a result, most researchers have concentrated their efforts on it. The Basic Arithmetic Unit BAU is built using a three-step approach that uses optical gates with three states to configure the circuitry for addition, subtraction, and multiplication. This is a new optical computing method based on the usage of a radix of (2): a binary number with a signed-digit (BSD) system that includes the numbers -1, 0, and 1. Light with horizontal polarization (LHP) (↔), light with no intensity (LNI) (⥀), and light with vertical polarization (LVP) (↨) is represen
... Show MoreThe rise of antibiotic-resistant bacteria necessitates the exploration of novel antimicrobial agents. Yttrium oxide nanoparticles (Y₂O₃) have shown potential due to their unique physicochemical properties and antibacterial activities against various pathogens. This study investigates the cytotoxic and antibacterial effects of Y₂O₃ nanoparticles against Serratia fonticuli and Citrobacter koseri, bacteria isolated from cholangitis patients. Bacterial strains were isolated from bile specimens and confirmed using standard microbiological techniques. The methods of X-ray diffraction (XRD), (SEM), and Frequency transform-infrared spectroscopic (FT-IR) were used to characterize YO₃ particles. Using a microdilution technique, the minimum
... Show MoreMultiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreScrophularia. striata from Scrophulariacea family has been used in Iranian folk medicine for the treatment of infectious diseases. In this study we evaluated the synergistic effect of S. striata hydroalcoholic extract (SSE) and commercially available antibiotics against P. aeroginosa and Methicillin- resistant Staphylococcus aureus (MRSA). The resazurin-based microdilution method was used to determine the minimum inhibitory concentration (MIC) values of plan extract and standard antibiotics. The interaction between standard antibiotics and SSE was evaluated by using checkerboard method. The results of this study revealed that SSE enhance the antibacterial activity of antibiotics. The combin
... Show MoreThe term of heterocyclic chemistry focuses only on heterocyclic compounds, which consider as a percentage of organic chemistry, they equal to greater than sixty-five. These compounds are widely founded in nature and most of them are important to life. In the past few years, scientist fused on 1,2,4-triazoles and their condensed heterocyclic ring due to their medicinal significance, 1,2,4-triazole containing Sulphur atom is one of the important heterocyclic moieties due to its broad range of biological activities also their derivatives can accommodate one of the alternatives as electronic effect as exchanges of the electronic density (electron donating or withdrawing) groups ; for all what mentioned above they are consider as a core
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More