The outstanding evidence of phthalimide pharmacophore in securing enhanced biological activities had encouraged further research and development into phthalimide-based derivatives as potential new drugs. In this study, phthalimide core was hybridized with aldehydes giving integrated imines displaying different types of functionalities and at alternating positions. The resulting compounds, therefore, provide an innovative window to explore possible differential biological effects as antioxidants and anticancer agents. A total of sixteen compounds were synthesized, and each was verified by FT-IR, H NMR, C NMR, and MS characterization. Herein, a facile single-step synthesis method was employed substituting the conventional two-step che
... Show MoreABSTRACT : A new ligand [ 2- (3-acetylthioureido)-3-phenylpropanoic acid (APA) is synthesized by reaction of acetyl isothiocyanate with phenylalanine (1:1). It is characterized by micro elemental analysis (C.H.N.S.), FT-IR, (UV-Vis) and 1H and 13CNMR spectra. Some metals ions complexes of this ligand were prepared and characterized by FT-IR, UV-Visible spectra, conductivity measurements, magnetic susceptibility and atomic absorption. From results obtained, the following formula [M(APA)2] where M2+ = Mn, Co, Ni, Cu, Zn, Cd and Hg, the proposed molecular structure for these complexes as tetrahedral geometry, except copper complex is has square planer geometry.
The reaction of starting materials (L-asCl2):bis[O,O-2,3;O,O-5,6-(chloro(carboxylic) methylidene)]- -L-ascorbic acid] with glycine gives new product bis[O,O-2,3,O,O-5,6-(N,O-di carboxylic methylidene N-glycine)-L-ascorbic acid] (L-as-gly) which is isolated and characterized by, Mass spectrum UV-visible and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the (L-as-gly) with M+2; Co(II) Ni(II) Cu(II) and Zn(II) has been characterized by FT- IR , Uv-Visible , electrical conductivity, magnetic susceptibility methods and atomic absorption and molar ratio . The analysis showed that the ligand coordinate with metal ions through mono dentate carboxylic resulting in six-coordinated with Co(II) Ni(II) Cu(II) ions while with
... Show MoreIn the present work, a series of new bis cyclic imides (pyromellit imides) linked to different nitrogen heterocycles namely (pyridine, pyrimidine, phenazone and quinoline) was synthesized.
Synthesis of the new imides was performed via two steps in the first one a series of bis amic acids (pyromellit amic acids) was synthesized via reaction of pyromellitic anhydride with variety of nitrogen heterocyclic primary amines while in the second step the prepared bis amic acids were dehydrated via treatment with acetic anhydride and anhydrous sodium acetate affording the desired imides.
The prepared bis Imides were screened for their antimicrobial activity against many types of bacteria and fungi and the results indicated that they possess
This research includes synthesis of new heterocyclic derivatives of N-benzyl-5-bromoisatin. New 1, 2, 4-triazole, oxazoline and thiazoline derivatives of [N-benzyl-5-bromo-3-(Ethyliminoacetate)-indole-2-one] (2) have been synthesized. The preparation process started by the reaction of 5-bromoisatin with sodium hydride in dimethylformamide (DMF) at 0°C, gave suspension of sodium salt of 5-bromoisatin and subsequent reaction with benzylchloride to give N-benzyl-5-bromoisatin (1). Compound (1) reacted with ethylglycinate (Schiff base) obtained the intermediate compound (2) which reacted with different reagents in two ways. The first way, compound (2) reacted with (hydrazine hydrate, semicarbazide, phenylsemicarbazide and thiosemicarbazide)
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of 1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.
In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More