One of the most important , compound which have active hydrogen is the compound possessing (thiol group) Biphenyl-4,4-dithiol is agood example utilized in a wide field for preparation mannich bases , avariety of new acetylenic mannich bases have been Synthesized and all proposed structure were Supported by FTIR , 1H – NMR, 13C-NMR , Elemental analysis and microbial study .
The aim of the work is synthesis and characterization of bidentate ligand [dipotassium sodium7-((E)-2-(2-((Z)-1-carboxylatoethylideneamino)thiazol-4-yl)-2 (carboxylatemethoxyimino) acet amido)-8-oxo-3-vinyl-5- thia-1-azabicyclo[4.2.0] oct-2- ene-2- carboxylate] [Nak2L], from the reaction of cefixime with sodium pyruvet to produce the ligand [Nak2L], the reaction was carried out in methanol as a solvent under reflux. The prepared ligand [Nak2L] which was characterized by FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR spectra, Mass spectra, (C.H.N) and melting point. The mixed ligand complexes were prepared from ligand [Nak2L] was used as a primary ligand while 8-hydroxy quinoline [Q] was used as a secondary ligand with metal ion M(Π).Where
... Show MoreThe aim of the work is synthesis and characterization of bidentate ligand [dipotassium sodium7-((E)-2-(2-((Z)-1-carboxylatoethylideneamino)thiazol-4-yl)-2 (carboxylatemethoxyimino) acet amido)-8-oxo-3-vinyl-5- thia-1-azabicyclo[4.2.0] oct-2- ene-2- carboxylate] [Nak2L], from the reaction of cefixime with sodium pyruvet to produce the ligand [Nak2L], the reaction was carried out in methanol as a solvent under reflux. The prepared ligand [Nak2L] which was characterized by FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR spectra, Mass spectra, (C.H.N) and melting point. The mixed ligand complexes were prepared from ligand [Nak2L] was used as a primary ligand while 8-hydroxy quinoline [Q] was used as a secondary ligand with metal ion M(?).Where M(?) =
... Show MoreThis work comprises the synthesis of new phenoxazine derivatives containing N-substituted phenoxazine starting from phenoxazine (1). Synthesis of ethyl acetate phenoxazine (2) through the reaction of phenoxazine with ethylchloroacetate, which reacted with hydrazine hydrate to give 10-aceto hydrazide phenoxazine (3), then reacted with formic acid to give 10-[N-formyl acetohydrazide] phenoxazine (4). Reaction of compound (4) with phosphorous pentaoxide or phosphorus pentasulphide to gave 10-[N-methylene-1,3,4-oxadiazole] phenoxazine (5) and 10-[N-methylene-1,3,4-thiadiazole] phenoxazine (6).
A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
Introduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were dete
... Show MoreThere is a continuous and massive need for newer cephalosporins that should have resistance against β-lactamases and can be used orally. An approach of using cephalexin, as a well-studied and potent antibacterial compound is considered to prepare new designed derivatives. These derivatives include the incorporation of amino acid moiety linked through an amide bond with the α-amino group of cephalexin. Certain aliphatic amino acids were used, such as glycine, alanine, valine and proline. The chemical structures of these derivatives were confirmed by IR spectroscopy and elemental analyses. All the synthesized compounds were subjected for preliminary evaluation of antimicrobial activity using well diffusion method, against certa
... Show MoreThis research, involved synthesis of some new 1,2,3-triazoline and 1,2,3,4- tetrazole derivatives from antharanilic acid as starting material .The first step includes formation of 2-Mercapto-3-phenyl-4(3H)Quinazolinone (0) through reacted of anthranilic acid with phenylisothiocyanate in ethanol, then compound (0) reaction with chloro acetyl chloride in dimethyl foramamide (DMF) to prepare intermediate S-(α-chloroaceto-2-yl)-3-phenylquinazolin-4(3H)-one (1); compound (1) reacted with sodium azide to yield S-(α-azidoaceto-2-yl)-3-phenylquinazolin-4(3H)-one (2), while Schiff bases (3-10) were prepared from condensation of substituted primary aromatic amines with different aromatic aldehydes in absolute ethanol as a solvent. Compound (2)
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More