12 membered Schiff base macrocyclic ligands, 6,7,14,15-tetra phenyl-1,2,3,4, 4a,8a, 9,10, 11,12, 12a,16a-dodecahydro dibenzo [b,h] [1,4,7,10] tetraazacyclododecine L1, and 14 membered Schiff base macrocyclic ligands, 6,8,15,17-tetramethyl-1,2,3,4, 4a,7,9a, 10,11,12,13,13a,16,18a-tetra decahydro dibenzo[b,i] [1, 4,8,11] cyclotetradecine tetraaza L2, 7,16-bis(2,4- dichloro benz ylidene)-6,8,15,17-tetra methyl-1,2,3,4, 4a,7,9a, 10, 11,12, 13, 13a,16,18a-tetra deca hydro dibenzo [b,i] [1,4,8,11] tetra azacyclo tetra decine L3 and 6,8,15, 17-tetramethyl-1,2,3, 4,4a,9a,10, 11,12,13,13a,18a-dodecahydro dibenzo [b,i] [1,4,8, 11] tetraazacyclo tetradecine (7,16-diylidene) bis(methanylyli dene) bis (N,N-dimethylaniline) L4 were synthesized by condensation reaction between diketone and aliphatic diamines. The metal complexes of the types, [ML1Cl2], [ML2Cl2], [ML3Cl2] and [ML4Cl2] [M= Co(II), Ni(II), Cu(II), Mn(II), Hg(II), and Fe(II)] were prepared by interaction of ligands, L1, L2, L3 and L4 with metal(II) ions. The ligands and their complexes were characterized by elemental analysis, magnetic susceptibility, conductivity measurements and IR, 1H and 13C NMR, UV–Vis spectral studies. The thermal stability of the complexes was also studied by TGA analyses. These studies show that all the complexes have octahedral arrangement around the metal ions. We used CB-Dock, a novel blind docking technique that aims to improve docking precision. With the aid of the cutting-edge docking program Autodock Vina, software online, molecular docking studies were used to evaluate the biological significance of the synthesized ligands and identify the probable and efficient binding mechanisms between the various ligands and the active site of the receptor protein. Affinity binding of both Ligand L3 and L4 to Penicillin binding protein 2x (chain B) with PDB 1PYY were much better than to Penicillin binding protein 2B (chain A) with PDB 1WAE due to the presence of hydrogen and halogen bonds. Therefore, they can be more recommended for drug design study to inhibit bacterial growth due their bioavailability. The biological activities of all compounds were evaluated like in-vitro antioxidant activity or percentage free radical scavenging effect via DPPH method against standard ascorbic acid and in vitro anticancer activity via MTT assay against colon cancer cell lines. Results of the biological activities showed that complex CuL3Cl2 exhibited the highest anti-cancer activity against colon cancer cell line i.e. 70.72±6.3 μg/ml among other copper complexes whereas compound CuL3Cl2 showed best antioxidant activity against ascorbic acid i.e. 75.07±1.96 μg/ml. While the biological activities showed that complex CuL4Cl2 exhibited the highest anti-cancer activity against colon cancer cell line i.e. 42.05±7.4 μg/ml among other copper complexes whereas compound CuL4Cl2 showed best antioxidant activity against ascorbic acid i.e. 65.47±1.37 μg/ml.
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Since the beginning of this century, a new communication map has been formed that foretells to get mankind to enter into a media environment in which the media is mixed with communication, which is technically and even intellectually known as integration.
This environment and its features are no different from the environment in its natural physical incision. If the level and temperature in the physical nature is a specific issue in the natural ecological balance, the level of freedoms, especially the transfer of information and views and circulation in society is also a determinant in the extent of media balance in the world on the one hand and in each country on the other.
There is also a special environment for nature,
... Show More* Khalifa E. Sharquie1, Hayder Al-Hamamy2, Adil A. Noaimi1, Mohammed A. Al-Marsomy3, Husam Ali Salman4, American Journal of Dermatology and Venereology, 2014 - Cited by 2
This paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.
Finally, all algori
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreThe internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
The base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.