One of the most important , compound which have active hydrogen is the compound possessing (thiol group) Biphenyl-4,4-dithiol is agood example utilized in a wide field for preparation mannich bases , avariety of new acetylenic mannich bases have been Synthesized and all proposed structure were Supported by FTIR , 1H – NMR, 13C-NMR , Elemental analysis and microbial study .
A novel Schiff base ligand (DBC) synthesized from 4-chlorobenzoic acid, along with its Cu (II) and Co (II) complexes, was prepared and characterized using FT-IR, 1H and 13C-NMR, UV-Vis spectroscopy, as well as magnetic and conductivity measurements. Based on this, a tetrahedral structure of [M(DBC)Cl2] was proposed for the complexes. Antioxidant activity of the compounds was assessed and compared to ascorbic acid, revealing that the copper complex exhibited superior antioxidant properties compared to the cobalt complex and the ligand. Furthermore, the antibiofilm potential of the copper and cobalt complexes was assessed against five clinically relevant bacterial species (P.aeruginosa, E.coli, K.pneumoniae, S.aureus and S.typhi) usin
... Show MoreNew chelating ligand derived from triazole and its complexes with metal ions Rhodium, Platinum and Gold were synthesized. Through a copper (I)-catalyzed click reaction, the ligand produced 1,3-dipolar cycloaddition between 2,6-bis((prop-2-yn-1-yloxy) methyl) pyridine and 1-azidododecane. All structures of these new compounds were rigorously characterized in the solid state using spectroscopic techniques like: 1HNMR, 13CNMR, Uv-Vis, FTIR, metal and elemental analyses, magnetic susceptibility and conductivity measurements at room temperature, it was found that the ligand acts as a penta and tetradentate chelate through N3O2, N2O2, and the geometry of the new complex
... Show Moreخلاصة (استطاعت اليابان بعد الحرب العالمية الثانية ان تنهض من جديد، وان تحقق تجربة تحديث سياسي جعلها تشهد تبدلات جذرية من الفقر الى الغنى ومن سيطرة الحكم العسكري الى الدولة المنزوعة السلاح ومن التخلف الى التكنولوجيا الاكثر تطورا في العالم, ومن الانغلاق والعزلة وذهنية سكان الجزر الى الانفتاح على ثقافات عصر العولمة ووسائل اعلامها. فكيف يمكن الاستفادة من هذه التجربة الحديثة سياسيا بل وحتى اقت
... Show MoreIn this work we prepared some schiff bases by condensation urea and benzaldehyde or its derevative ( bromo benzaldehyde or hydroxy benzaldehyde ) as ( 1 : 1 ) mole ( urea : benzaldehyde or its substitution ) to prepare compounds ( A1 , B1 , C1 , D1 , E1 , F1 , G1 ) and ( 1 : 2 ) mole ( urea : benzaldehyde or its substitution ) to prepare compounds ( A2 , B2 , C2 , D2 , E1 , F2 , G2 ) . The prepared compounds identified spectroscopic by infrared spectroscopy FT-IR and Thin layer chromotography T.L.C . The force constant calculated from the wave number for the carbonyl stretching from FT-IR chart and by using the following equation K = 4?2C2?'2? The change in double bond order for carbonyl deteremined in according with some past re
... Show MoreThe ligand [Potassium (E)-(4-(((2-((1-(3-aminophenyl) ethylidene) amino)-4-oxo-1, 4-dihydropteridin-6-yl) methyl) amino) benzoyl)-L-glutamate] was prepared from the condensation reaction of folic acid with (3-aminoacetophenone) through Schiff reaction to give a new Schiff base ligand [H2L]. The ligand [H2L] was characterized by elemental analysis CHN, atomic absorption (AA),(FT-IR),(UV-Vis), TLC, ES mass (for spectroscopes), molar conductance, and melting point. The new Schiff base ligand [H2L], reacts with Mn (II), Co (II), Ni (II), Cu (II), Cr (III) and Cd (II) metal ions and (2-aminophenol),(metal: derivative ligand: 2-aminophenol) to give a series of new mixed complexes in the general formula:-K3 [M2 (HL)(HA) 2],(where M= Mn (II) and Cd
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More