the main of this paper is to give a comprehensive presentation of estimating methods namely maximum likelihood bayes and proposed methods for the parameter
Objectives: Six different Schiff bases were synthesized from ampicillin and amoxicillin with isatin, 5-bromoisatin, and 5-nitroisatin. Methods: Ampicillin and Amoxicillin are linked directly through their α-amino groups to the acyl side chain with isatin and isatin derivatives by nucleophilic addition using glacial acetic acid as a catalyst. Results: chemical structures of these Schiff bases were confirmed using FTIR, 1H NMR and elemental microanalysis. The antibacterial activity was evaluated by measuring minimum inhibitory concentration (MIC) values and showed various degrees of antibacterial activities when compared with parent drugs. Compounds 1a and 2b, which are the Schiff bases of ampicillin and amoxicillin with isatin, showed very
... Show MoreThis work includes synthesis of new six membered heterocyclic rings with effective amino group using the reaction of benzylideneacetophenone (chalcone) (1) with thiourea or urea in alcoholic basic medium to form: 1,3-thiazen-2-amine (2), and 1,3-oxazin-2-amine (8) respectively. The diazotization reaction was carried out with sodium nitrite in presence of hydrochloric acid to form diazonium salts which suffered coupling reaction with naphthols and phenols in the presence of sodium hydroxide to form colored azo dyes (4-7, and 10-13). o-methylation reaction of compounds (7) and (10) yielded : 1,3-thiazin -2-yl-diazenyl (14), and 1,3-oxazin-2-yl-diazenyl (15) respectively.The new compounds were characterized using vario
... Show MoreBackground: The isatin molecule is present in many natural substances, including plants and animals, and is used to prepare compounds with various biological activities. Objectives: To synthesize a new series of isatin derivatives with the expectation that they will have antimicrobial activity. Methods: Thiazole Schiff bases were synthesized from various Mannich bases of isatin to evaluate their antimicrobial properties. Initially, Mannich bases (2a–e) were synthesized by reacting isatin with formaldehyde and different secondary amines. Subsequently, they were treated with 2-aminothiazole to yield the final compounds (3a–e). Spectroscopic characterization was done via FT-IR and 1H-NMR. The antimicrobial screening was conducted o
... Show MoreSo far synthesis of Gonadotropin Releasing Hormone (GnRH) analogues reported in the literature has clarified some aspects of structural activity of the naturally released GnRH. As a part of continuing efforts for further understanding of this relationship, the present investigation was undertaken which involved synthesis and biological evaluation of two GnRH analogues, firstly, by replacement of the amino acid L-Argenine in the 8th position at the backbone structure of the natural hormone by the amino acid D-Alanine; and secondly, by replacement of the amino acid L-Glycine in the 10th position by D-Alanine also at the backbone structure of the nature hormone, to obtain the following analogues respectively:
P
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThis paper deals with constructing mixed probability distribution from mixing exponential
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Since the beginning of this century, a new communication map has been formed that foretells to get mankind to enter into a media environment in which the media is mixed with communication, which is technically and even intellectually known as integration.
This environment and its features are no different from the environment in its natural physical incision. If the level and temperature in the physical nature is a specific issue in the natural ecological balance, the level of freedoms, especially the transfer of information and views and circulation in society is also a determinant in the extent of media balance in the world on the one hand and in each country on the other.
There is also a special environment for nature,
... Show More