Preferred Language
Articles
/
sRbkS4oBVTCNdQwCSZOg
Cytotoxic effects of new synthesis heterocyclic derivatives of Amoxicillin on some cancer cell lines
...Show More Authors

A new Schiff base [I] was prepared by refluxing Amoxicillin trihydrate and 4-Hydroxy- 3,5-dimethoxybenzaldehyde in aqueous methanol solution using glacial acetic acid as a catalyst. The new 1,3-oxazepine derivative [II] was obtained by Diels- Alder reaction of Schiff base [I] with phthalic anhydride in dry benzene. The reaction of Schiff base [I] with thioglycolic acid in dry benzene led to the formation of thiazolidin-4-one derivative [III]. While the imidazolidin-4-one [IV] derivative was produced by reacting the mentioned Schiff base [I] with glycine and triethylamine in ethanol for 9 hrs. Tetrazole derivative [V] was synthesized by refluxing Schiff base [I] with sodium azide in dimethylformamid DMF. The structure of synthesized compounds[I-V] was characterized by their melting points, elemental analysis CHN-S and by their spectral data; FTIR and 1H NMR spectroscopy. Two cancer cell lines include: (RD) human pelvic rhabdomyosarcoma and (L20B) the mice intestines carcinoma cell line (which expresses the genes for human cellular receptor for Polio viruses) were used in this study. The cytotoxic effect of different concentrations of all the synthesized compounds for 48 hrs was examined. All compounds except [IV] and [V] showed less than 50% inhibition for (L20B), while these compounds exhibit inhibition more than 50% inhibition for (RD).

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Synthesis and Characterization of Co-Polymer (Styrene / Allyl 2,3,4,6-tetra-O-acetyl-β-D-glucopyranoside) and Studying some of its thermal properties
...Show More Authors

In this research, a Co-polymer (Styrene / Allyl-2.3.4.6-tetra-O-acetyl-β-D-glucopyranoside) was synthesized from glucose in four steps using Addition Polymerization according to the radical mechanism using Benzoyl Peroxide (BP) as initiator. Initially, Allyl-2.3.4.6-tetra-O-acetyl-β-D-glucopyranoside monomer was prepared in three steps and the reaction was followed by (HPLC, FT-IR, TLC), in the fourth step the monomer was polymerized with Styrene and the structure was determined by FT-IR and NMR spectroscopy. The reaction conditions (temperature, reaction time, material ratios) were also studied to obtain the highest yield, the relative, specific and reduced viscosity of the prepared polymer was determined, from which the viscosity ave

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Scienc
Synthesis, Spectral and Bacterial Studies of Mixed Ligand Complexes of Schiff Base Derived from Methyldopa and Anthranilic Acid with Some Metal Ions
...Show More Authors

Bidentate Schiff base ligand 3-(3,4-Dihydroxy-phenyl)-2-[(4-dimethylamino-benzylidene)-amino]-2-methyl-propionic acid was prepared and characterized by spectroscopic techniques studies and elemental analysis. The Cd(II), Ni(II), Cu(II), Co(II), Cr(III),and Fe(III) of mixed-ligand complexes were structural explicate through Moler conductance , [FT-IR, UV-Vis & AAS], chloride contents, , and magnetic susceptibility measurements. Octahedral geometries have been suggested for all complexes. The Schiff base and its complexes were tested against various bacterial species, two of {gram(G+) and gram(G-)} were shown weak to good activity against all bacteria.

Preview PDF
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Synthesis and characterization of some biological active transition metal complexes of Schiff base derived from cefixime with mixed ligand 8-hydroxy quinoline
...Show More Authors

The aim of the work is synthesis and characterization of bidentate ligand [dipotassium sodium7-((E)-2-(2-((Z)-1-carboxylatoethylideneamino)thiazol-4-yl)-2 (carboxylatemethoxyimino) acet amido)-8-oxo-3-vinyl-5- thia-1-azabicyclo[4.2.0] oct-2- ene-2- carboxylate] [Nak2L], from the reaction of cefixime with sodium pyruvet to produce the ligand [Nak2L], the reaction was carried out in methanol as a solvent under reflux. The prepared ligand [Nak2L] which was characterized by FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR spectra, Mass spectra, (C.H.N) and melting point. The mixed ligand complexes were prepared from ligand [Nak2L] was used as a primary ligand while 8-hydroxy quinoline [Q] was used as a secondary ligand with metal ion M(?).Where M(?) =

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Synthesis and characterization of some biological active transition metal complexes of Schiff base derived from cefixime with mixed ligand 8-hydroxy quinoline
...Show More Authors

The aim of the work is synthesis and characterization of bidentate ligand [dipotassium sodium7-((E)-2-(2-((Z)-1-carboxylatoethylideneamino)thiazol-4-yl)-2 (carboxylatemethoxyimino) acet amido)-8-oxo-3-vinyl-5- thia-1-azabicyclo[4.2.0] oct-2- ene-2- carboxylate] [Nak2L], from the reaction of cefixime with sodium pyruvet to produce the ligand [Nak2L], the reaction was carried out in methanol as a solvent under reflux. The prepared ligand [Nak2L] which was characterized by FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR spectra, Mass spectra, (C.H.N) and melting point. The mixed ligand complexes were prepared from ligand [Nak2L] was used as a primary ligand while 8-hydroxy quinoline [Q] was used as a secondary ligand with metal ion M(Π).Where

... Show More
Publication Date
Tue Jul 21 2015
Journal Name
Diyala Journal For Pure Sciences
Synthesis and biological studies 0fCo(||)،Ni(||)،Cu(||) And Zn(||)complexes with New compound N-(2,3-dioxoindolin-1-yl)_N_methyl benzamide
...Show More Authors

Synthesis and biological studies 0fCo(||)،Ni(||)،Cu(||) And Zn(||)complexes with New compound N-(2,3-dioxoindolin-1-yl)_N_methyl benzamide

Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Designand Implementation of New DES64X and DES128X on 32, 64 Bit Operating System Environments
...Show More Authors

In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Research Journal Of Pharmacy And Technology
Effect different concetration and pH on complexes formation of New Tetradentate Schiff base Ligand
...Show More Authors

New N2O2 donor kind Schiff basehas been destined and structured by reaction Ampyrone with O-hydroxyacetophenone and Anthranilic acid. The metal complexes of the Schiff base with Mn(II), Hg(II), Ni(II), Cu(II), and Co(II) metal ions were designed and characterized by magnetic susceptibility, elemental analyses, molar conduction, IR, and 1H NMR,UV-Vis spectral metrics.The UV-Vis. and magnetic susceptibility data of the complexes suggest a square-planar, tetrahedraland octahedral geometries around the central metal ions. All elaborations were accomplished after determination the optimum molar concentration and pH which followed law of Lambert-Beer's in the researches pH scopes. The composition of these complexes were conclude dapprobating to t

... Show More
Scopus (1)
Scopus
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF