The Mannich base ligand was synthesized in an ethanol medium through a condensation reaction of 2-mercaptobenzimidazole and ciprofloxacin at room temperature. Subsequently, several metal complexes of this ligand were prepared. To characterize both the base ligand and the metal complexes, various techniques were employed, including elemental analysis, FT-IR spectroscopy, UV-Vis spectroscopy, molar conductivity measurements, magnetic moment determination, and melting point analysis. The results were shown that the metal complexes formed have the formula [Cr(L)2Cl2] Cl.H2O and [Rh(L)2(H2O)2] Cl3.H2O, where L= mannich base ligand. Based on spectroscopic analytical, coordination with metal ions involves the 'N' donor atom of mannich base and 'N' atom of piprizaing ring, and two complexes are A six-coordinated octahedral structure is suggested. Molar conductivity of these complexes showed that they were electrolytic in nature. In this study, the anticancer and antioxidant potential of the Mannich base ligand and its metal complexes were investigated against MDA-MB-231 cell lines and using the DPPH free radical scavenging assay. Moreover, the in vitro efficacy of the ligand and its complexes against Gram-negative bacteria (E. coli) and Gram-positive bacteria (Staphylococcus aureus), as well as the fungal strain Candida albicans, was evaluated using the disc diffusion method. The results indicated that Cr (III) and Rh(III) complexes demonstrated the highest levels of cytotoxicity against MDA-MB-231 cell lines, enhances antioxidant and antimicrobial activity more than the free ligand. These findings suggest that these metal complexes may have promising applications in the development of novel anticancer, antioxidant and antimicrobial agents.
In this work, we synthesized thirteen compounds of 1-(2-furoyl)thiourea derivatives 1-13 by conversion of 2-furoyl chloride to 2-furoyl isothiocyanate by reacting it with potassium thiocyanate in dry acetone in a quite short reflux time then, in the same pot, different of (primary and secondary amines) were added individually to achieve thiourea derivatives. The products were characterized spectroscopically using (FT-IR, 1H NMR and 13C NMR) techniques. Some of them were evaluated as antioxidant agents using DPPH radical scavenging method, and all were examined theoretically as enzyme inhibitors against Bacillus pasteurii urease (pdb id: 4ubp) and by studying molecular docking using Autodock (4.2.6) software.
This study examined the adsorption behavior of anionic dye (orange G) from aqueous solution onto the raw and activated a mixture of illite, kaolinite and chlorite clays from area of Zorbatiya (east of Iraq).The chemical treatment involved alkali and acid activation. The alkali activation obtained by treated the raw clay (RC) with 5M NaOH (ACSO) and the acid activation founded by treated it with 0.25M HCl (ACH) and 0.25M (ACS). The thermal treatment carried out by calcination the produce activated clay at 750oC for acid activation and 105oC for alkali activation. Batch
... Show MoreThe current research aims to reveal the level of satisfaction of the mentors with the evaluation of their performance according to gender (male - female) and to formulate the predictive equation for the level of performance (dependent variable) from knowing the level of satisfaction with the evaluation (independent variable). (16 paragraphs) contains alternatives to the answer that measures the level of satisfaction (weak, medium, and high) (1,2,3), that is, with a hypothetical average of (32). It consisted of 100 educational counselors consisting of 45 males and 55 females, the results of the research concluded that the level of satisfaction with performance is below the mean when compared with the hypothetical average of the scale of s
... Show MoreOrganic permeable‐base transistors (OPBTs) show potential for high‐speed, flexible electronics. Scaling laws of OPBTs are discussed and it is shown that OPBT performance can be increased by reducing their effective device area. Comparing the performance of optimized OPBTs with state‐of‐the‐art organic field‐effect transistors (OFETs), it is shown that OPBTs have a higher potential for an increased transit frequency. Not only do OPBTs reach higher transconductance values without the need for sophisticated structuring techniques, but they are also less sensitive to parasitic contact resistances. With the help of a 2D numerical model, the reduced contact resistances of OPBTs are explained by a homogeneous injection of current acros
... Show MoreIn this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More* Khalifa E. Sharquie1, Hayder Al-Hamamy2, Adil A. Noaimi1, Mohammed A. Al-Marsomy3, Husam Ali Salman4, American Journal of Dermatology and Venereology, 2014 - Cited by 2