New series of 4,4'-((2-(Aryl)-1H-benzo[d]imidazole1,3(2H)-diyl)bis(methylene))Diphenol(3a-g) was successfully synthesized from cyclization of the reduction product of bis Schiff bases (2) with aryl aldehydes bearing phenolic hydroxyl in the presence of acetic acid. The structure of these compounds was identified from FT-IR, 1H NMR, 13C NMR and EIMs. The Antioxidant capability was screened by DPPH and FRAP assays. Both assays showed antioxidant capability more than BHT as well. Compounds 3b and 3c showed antioxidant capacity slightly less than ascorbic acid. The docking study for theses compound was carried out as III DNA polymerase inhibitor. The results of docking demonstrated that the increase in hinderances around phenolic hydroxyl for the aryl attached position two for benzimidazole decrease the capability of interaction and give less bending and smaller docking score and there is inverse relationship between increasing hindrances around phenolic hydroxyl and DNA polymerase inhibition for these compounds.
New 2-Mercaptobenzimidazole derivatives were synthesized. 4,5-disubsitituted 1,2,4-Triazole compounds 1b-2c were synthesized from 2-(benzylthio) benzimidazole compound a, which was then reacted with (NaH) in dioxane at a temperature of (0-5 C°) to produce the salt of compound a. Then the salt was reacted with ethyl chloro acetate to yield Ethyl 2-(benzylthio) benzimidazole acetate compound b. Compound b was converted to triazole derivatives by two pathways. The first pathway was reacting compound b with semicarbazide, thiosemicarbazide and phenylsemicarbazide in DMSO as a solvent to gain compounds 1b-3b, which were then
... Show MoreThis paper aims to study the asymptotic stability of the equilibrium points of the index 2 and index 3 Hesenberg differential algebraic equations. The problem reformulated to an equivalent explicit differential algebraic equations system, so the asymptotic stability is easily investigated. The singular points such as impasse points and singularity induced bifurcation points are identified in this kind of differential algebraic equations by using conclusion of the explicit differential algebraic equations.
This paper aims to study the asymptotic stability of the equilibrium points of the index 2 and index 3 Hesenberg differential algebraic equations. The problem reformulated to an equivalent explicit differential algebraic equations system, so the asymptotic stability is easily investigated. The singular points such as impasse points and singularity induced bifurcation points are identified in this kind of differential algebraic equations by using conclusion of the explicit differential algebraic equations.
This paper aims to study the asymptotic stability of the equilibrium points of the index 2 and index 3 Hesenberg differential algebraic equations. The problem reformulated to an equivalent explicit differential algebraic equations system, so the asymptotic stability is easily investigated. The singular points such as impasse points and singularity induced bifurcation points are identified in this kind of differential algebraic equations by using conclusion of the explicit differential algebraic equations.
The complexes of Schiff base of 4-aminoantipyrine and 1,10-phenanthroline with metal ions Mn (II), Cu (II), Ni (II) and Cd (II) were prepared in ethanolic solution, these complexes were characterized by Infrared , electronic spectra, molar conductance, Atomic Absorption ,microanalysis elemental and magnetic moment measurements. From these studies the tetrahedral geometry structure for the prepared complexes were suggested.The prepared ligand of 4-aminoantipyrine was characterized by using Gc-mass spectrometer .
The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre
... Show More