Preferred Language
Articles
/
bijps-353
Design, Synthesis and Kinetic Study of Coumarin-Based Mutual Prodrug of 5-Fluorouracil and Dichloroacetic acid
...Show More Authors

On the basis of known coumarin-based prodrug system, a novel coumarin-based mutual prodrug of 5-fluorouracil and dichloroacetic acid was designed, synthesized and evaluated as a promising oral chemotherapeutic agent basing on in vitro stability study in HCl buffer (pH 1.2) and in phosphate buffer (pH 7.4), as well as in vitro release study in human serum. The chemical structure of prodrug was confirmed by analyzing its FTIR, 1H NMR, 13C NMR and MS-ESI spectra. The results of in vitro kinetic study indicated that the prodrug was significantly stable in HCl and in phosphate buffers, and was hydrolyzed in human serum followed pseudo first order kinetics.

Keywords: Coumarin-based prodrug, 5-fluorouracil, Dichloroacetate, kinetics.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 02 2019
Journal Name
Biochem. Cell. Arch.
NEW MIXED LIGAND OF DITHIOCARBAMATE AND 8- HYDROXYQUINOLINE WITH SOME COMPLEXES OF SCHIFF BASE LIGAND : SYNTHESIS, SPECTRAL ANALYSIS AND BIOLOGICAL ACTIVITY
...Show More Authors

The preparation, spectroscopic characterisation of complexes derived from the mixed ligands with CdII, ZnII and CoII metal ions with Schiff base, Dithiocarbamates (DTCs) and 8-Hydroxyquinoline are reported. The compounds that prepared have been defined via; chloride content, F.T-IR, UV-Vis 1H-NMR spectroscopy and C.H.N.S, as well as conductance and magnetic susceptibility.All data which collected from such methods specified complexes with 6 coordinates in solution and solid states. The biologicalactivity that is related to all the prepared compounds which were screened for their antimicrobial activitiesagainst (G+ and (G- )). The data that collected from biological activity indicate that complexes will have extra activity against such teste

... Show More
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Synthesis of Some Mixed ligands Complexes of (2-hydroxy benzaldine)-4-amino Antipyrine and 1,10-phenanthroline and Studying their antibacterial activity
...Show More Authors

Complexes from the ligand (2-hydroxy benzaldine)-4-aminoantipyrine with some transition metal ions V(l?),Cr(lll),Fe(lll) and Co(ll) were prepared in the presence of the co-ligand 1,10-phenanthroline in alcoholic medium. These compounds were characterized by the available techniques: FT-IR ,UV-Visible ,magnetic susceptibility, Flame atomic absorption technique as well as elemental analysis and conductivity mesurments .From these spectral studies, a square pyramidal structure proposed for V(IV) complex and an octahedral geometry for Cr(III),Fe(III) and Co(II) complexes. The biological activity of the ligands and their complexes were evaluated by a gar plate diffusion technique against three human pathogenic bacterial strains: Pseudomonas ae

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Aug 31 2017
Journal Name
Available At Ssrn 3030385
Synthesis, Spectral Studies And Antimicrobial Activity Of Mixed Ligand Complexes Of Cephalexin And Dimethylglyoxime With Some First Row Transition Metal Ions
...Show More Authors

In this paper ,six new mixed metal ligand complexes are reported with Cephalexin (Ceph.H)as a primary ligand and Dimethylglyoxime (DMG) as secondary ligand with metal Chloride [MCl2 .nH2O. M=Mn(II),Co(II),Cu(II),Ni(II) and Zn(II),n=0-6] ,CrCl3.6H2O.The complexes are of (1:1:1)(Metal:Ligand: Ligand) Stoichiometry.The structures of these complexes are confirmed by using FT-IR and UV- electronic spectroscopies, magnetic moments, melting points, molar conductivity measurements and the metal % analysis revealed that the complexes analyze indicates a four coordinated as (A)=[M(HDMG) (Ceph)] .M=[Ni(II)and Zn(II).Six coordinated as (B) = K2[M(DMG)(CePh)(H2O)]. M= Mn (II),Co(II) and Cu(II) and (C)=[Cr(DMG)(Ceph)]Cl2. Interestingly, the in-vitro anti

... Show More
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Engineering
Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl
...Show More Authors

It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.

Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Private Backend Server Software-Based Telehealthcare Tracking and Monitoring System
...Show More Authors

In these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso

... Show More
View Publication
Scopus (27)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref