The work includes synthesis and characterization of some new heterocyclic compounds, as flow: The compound (3) (5-(4-chlorophenyl) -2-hydrazinyl-1,3,4-oxadiazole was synthesized by using two methods; the first method includes the direct reaction between hydrazine hydrate 80% and 5-(4-chlorophenyl)-2- (ethylthio) 1,3,4-oxadiazole (1), the second method involves converting 5-(4-chlorophenyl)-1,3,4-oxadiazol-2-amine (2) to diazonium salt then reducing this salt to compound (3) by stannous chloride. Compound (3) was used as starting material for synthesizing several fused heterocyclic compounds. The compound 6-(4-chlorophenyl)[1,2.4] triazolo [3,4,b][1,3,4] oxadiazole-3-(2H) thione (compound 4) was synthesized from the reaction of compound (3) with carbon disulfide in presence of potassium hydroxide. Compound 6-(4-chlorophenyl)-[1,2,4] triazolo [3,4-b][1,3,4] oxadiazole-3-amine (5) was synthesized from treatment of compound (3) with cyanogen bromide at room temperature in the presence of sodium hydrogen carbonate. Direct reaction between acetic acid and compound (3) in POCl3 affords 6-(4-chlorophenyl)-3-methyl-[1,2,4] triazolo [3,4,b][1,3,4] oxadiazole (compound 6). Five new fused rings derivatives (12-16) [6-(4-chlorophenyl)-3-(aryl)-[1,2,4] triazolo[3,4-b][1,3,4]oxadiazol] were synthesized by two steps. The first step was synthesized by corresponding Schiff bases (7-11) from reaction compound (3) with five aryl aldehyde. These Schiff bases were used as substrate to synthesize compounds (12-16) by treating these compounds with bromine in glacial acetic acid in dry sodium acetate.The synthesized compounds were characterized by FTIR,H-NMR,C-NMR and CHNS analysis.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreNew bidentate dithiocarbamate ligand (NaL) namely [Sodium-2-(((3-methyl -4- “(2,2,2-tri fluoro ethoxy) pyridin-2”-yl) methyl) sulfinyl)-1H-benzoimidazole -1-carbodithioate] was prepared. This free ligand was synthesized from the reaction of a (RS)-2-([3-methyl -4-(2,2,2-tri fluoroethoxy) pyridin-2-yl] methyl sulfinyl)-1H benzoimidazole, CS2 and NaOH in methanol as solvent. From reaction of dithiocarbamate salt (NaL) with metal ions (M); Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Pd(II)”, have obtained the DTC complexes at general molecular formula [M(L)2(H2O)2] and [Pd(L)2]. To characterize the ligand and its complexes, used different analyses methods such FTIR, UV-Vis, elemental microanalysis, atomic absoreption, magnetic susceptibil
... Show MoreThe preparation and characterization of the Cu (II), Co(II), Ni(II), Zn(II), Cd(II), and Hg(II) metal complexes of heterocyclic azo ligand 2-[(4`-sulphamide phenyl) azo] -4,5-diphenyl imidazole (4-SuBAI) have been studied by elemental analysis, FT-IR and UV-Vis Spectroscopic, magnetic moment and molar conductance methods. The analytical data showed that all chelate complexes were prepared with (metal-ligand) ratio of (1:2). The general formula of these complexes was [ML2X2]. nH2O [were L=2-[(4`-sulphamide phenyl) azo]-4,5-diphenyl imidazole and X=Cl, and the octahedral geometry were suggested for these complexes .
Complexes of (Co2+, Ni2+, Cu2+, Zn2+, Cd2+ and Hg2+) with the ligand Ethyl cyano (2-methyl carboxylate phenyl azo acetate) (ECA) have been prepared and characterized by FTIR, (UV-Visible), Atomic absorption spectroscopy, Molar conductivity measurements and magnetic moments measurements. The following general formula has been suggested for the prepared complexes [M(ECA)2]Cl2 where M = (Co2+, Ni2+, Cu2+ ,Zn2+, Cd2+, Hg2+) and the geometry is octahedral.
2,2'-(1-(3,4-bis(carboxydichloromethoxy)-5-oxo-2,5-dihydrofuran-2-yl)ethane-1,2-diyl)bis(oxy)bis(2,2-dichloroacetic acid) a derivative of L-ascorbic acid was prepared by reaction of L-ascorbic acid with trichloroacetic acid (1:4) ratio, in the presence of potassium hydroxide. A series of new metal complexes of this ligand were prepared by a reaction with the chlorides of Cd(II), Co(II), Ni(II), Cu(II) and Zn(II). The new ligand and its complexes were identified by C.H.N., IR, UV-visible spectra, Thermogravimetric analysis (TGA), as well as 1H, 13C-NMR and Mass spectra for ligand L. The complexes were also identified by molar conductance, atomic absorption, magnetic susceptibility and X-ray diffraction for Cu (II) complex. FT-IR spectra
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More