Objective: Synthesized a series of new thiourea (TU) derivatives, tested their antioxidant activity, and investigated their expected biological activity by theoretical study (computational methods). Methods: The derivatives were made using a one-pot reaction with two steps. Initially, succinyl chloride was mixed with KSCN to make succinyl isothiocyanate. Then, primary and secondary amines were used to make TU derivatives. The theoretical studies were done by Swiss ADME and molecular docking via Genetic Optimization of Linkage Docking (GOLD). Then evaluate antioxidant activity using the DPPH scavenging method. Results: FT-IR, 1H NMR, and 13C NMR spectroscopy show the verification of all the prepared derivatives. Compounds (II), (VIII),
... Show MoreA new series of ?-D-glucose as Schiff bases derivatives is synthesized and characterized with studying their bioactivity. Hydroxyl groups at C (1,2&5,6) sugar moiety are converted into acetal form through a reaction with dry acetone using phosphoric acid and anhydrous zinc chloride as catalysts producing 1,2:5,6-di-O-isopropyledine ?-D-glucofuranose(I). The five memberd ring acetal of C(5,6) is hydrolyzed with acetic acid (65%)and a reaction of the new product with sodium periodate is carried on to get an aldehyde moiety which is used to produce a new series of Schiff bases through reacting with different amino compounds such as 4-amino antipyrene . The suggested chemical structures of the prepared compounds are confirmed by using UV., FT
... Show More4, 4s (pyridine 2, 6 diylbis (1, 3, 4 oxadiazole 5, 2 diyl)) bisphenol monomer (3) was synthesized from cyclization of Ns2, Ns6 bis (4 hydroxybenzylidene) pyridine 2, 6 dicarbohydrazide (2) in the presence of bromine in glacialacetic acid. Newly five polymers (P1P5) were synthesized from reaction bis 1, 3, 4 oxadiazole bisphenolmonomer with five different di acid chloride. The antibacterial activity of the synthesized polymers was screened against gram positive and gram negative bacteria. Polymers P4 and P5 exhibited significant antibacterial against all microorganisms, as well these polymers showed highest antifungal activity.
Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.
Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called