Preferred Language
Articles
/
bsj-1416
Synthesis and Characterization of Derivatives Based on 4, - Dimercaptobiphenyl
...Show More Authors

Starting from 4, - Dimercaptobiphenyl, a variety of phenolic Schiff bases (methylolic, etheric, epoxy) derivatives have been synthesized. All proposed structure were supported by FTIR, 1H-NMR, 13C-NMR Elemental analysis all analysis were performed in center of consultation in Jordan Universty.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Medicinal And Chemical Sciences
Synthesis, Characterization, and Biological Activity of New Metal Ion Complexes with Schiff Base (Z)-3((E)-2-Hydroxybenzylidene) hydrazineylidene)indolin-2-one
...Show More Authors

The study involved preparing a new compound by combining between 2- hydroxybenzaldehyde and (Z)-3-hydrazineylideneindolin-2-one resulting in Schiff bases and metal ions: Mn(II), Co(II), Ni(II), Cu(II), and Zn(II) forming stable minerals-based-Schiff complexes. The formation of resulting Schiff bases is detected spectrally using LC-Mss which gave corresponding results with theoretical results, 1H-NMR proves the founding of N=CH signal, FT-IR indicates the occurrence of imine band and UV-VIs mean is proved the ligand formation. On the other hand, minerals-based-Schiff was characterized using the same spectral means that relied with ligand (Schiff bases). Those means gave satisfactory results and proved the suggested distinguishable geometries

... Show More
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Synthesis, characterization, molecular docking, ADMET prediction, and anti-inflammatory activity of some Schiff bases derived from salicylaldehyde as a potential cyclooxygenase inhibitor
...Show More Authors

A series of Schiff base-bearing salicylaldehyde moiety compounds (1-4) had been designed, synthesized, subjected to insilico ADMET prediction, molecular docking, characterization by FT-IR, and CHNS analysis techniques, and finally to their Anti-inflammatory profile using cyclooxygenase fluorescence inhibitor screening assay methods along with standard drugs, celecoxib, and diclofenac. The ADMET studies were used to predict which compounds would be suitable for oral administration, as well as absorption sites, bioavailability, TPSA, and drug likeness. According to the results of ADME data, all of the produced chemicals can be absorbed through the GIT and have passed Lipinski’s rule of five. Through molecular docking with PyRx 0.8, these

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Heavy Metal Complexes of 1, 2, 3-Triazole derivative: Synthesis, Characterization, and Cytotoxicity Appraisal Against Breast Cancer Cell Lines (MDA-MB-231)
...Show More Authors

     New chelating ligand derived from triazole and its complexes with metal ions Rhodium, Platinum and Gold were synthesized. Through a copper (I)-catalyzed click reaction, the ligand produced 1,3-dipolar cycloaddition between 2,6-bis((prop-2-yn-1-yloxy) methyl) pyridine and 1-azidododecane. All structures of these new compounds were rigorously characterized in the solid state using spectroscopic techniques like: 1HNMR, 13CNMR, Uv-Vis, FTIR, metal and elemental analyses, magnetic susceptibility and conductivity measurements at room temperature, it was found that the ligand acts as a penta and tetradentate chelate through N3O2, N2O2, and the geometry of the new complex

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Preparation and Identification of some new Pyrazolopyrin derivatives and their Polymerizations study
...Show More Authors

Preparation and Identification of some new Pyrazolopyrin derivatives and their Polymerizations study

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
مؤتمر النسوي الثالث / كلية العلوم للبنات
Synthesis , Characterization and study of Biological Activities of Mixed Ligand-Complexes of Saccharin and Trimethoprim with Ni(II),Co(II),Cu(II), Hg(II) and Cd(II)
...Show More Authors

Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref