Eurasian Journal of Analytical Chemistry最新文献

筛选
英文 中文
DFT Study of Intermolecular Proton Exchange with Some Derivatives of Benzoic Acids 苯甲酸衍生物分子间质子交换的DFT研究
Eurasian Journal of Analytical Chemistry Pub Date : 2023-01-01 DOI: 10.31489/2959-0663/3-23-14
A. Kurmanova, F. Abilkanova, I. Pustolaikina, Sergey N. Nikolskiy
{"title":"DFT Study of Intermolecular Proton Exchange with Some Derivatives of Benzoic Acids","authors":"A. Kurmanova, F. Abilkanova, I. Pustolaikina, Sergey N. Nikolskiy","doi":"10.31489/2959-0663/3-23-14","DOIUrl":"https://doi.org/10.31489/2959-0663/3-23-14","url":null,"abstract":"A theoretical study of proton transfer dynamics in complexes of some substituted benzoic acids with 3,6-di-tert-butyl-2-hydroxyphenoxyl (DTBPO) radical is presented. To elucidate the transfer mechanism, reaction pathways for various complexes of benzoic acid derivatives with DTBPO were modeled. The calculations were performed by the DFT method at the UB3LYP/6-31G+(d, p) level of theory using QST3, IRC proce-dures, in vacuum and toluene medium (PCM solvation model). Geometric and kinetic parameters of com-plexes with o-, p-, and m-isomers of nitrobenzoic and chlorobenzoic acids were calculated. Theoretically es-timated activation barrier of 29-30 kJ/mol turned out to be approximately 30 % higher than the previously ob-tained experimental data. It was noted that in the case of o-isomers of aromatic acids the coplanarity of the transition state structure is violated, in contrast to the initial state. This leads to a change in the proton transfer mechanism. The dynamics of charge distribution, dipole moment and electrostatic potential in the studied complexes were analyzed. Based on the calculated data, it was shown that the studied intermolecular proton exchange process occurs throughout Hydrogen Atom Transfer (HAT), and not throughout Proton-Coupled Electron Transfer (PCET) mechanism.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"230 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89033110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simple and Efficient Method for One Pot Multicomponent Synthesis of 3,4-Dihydropyrimidin-2-(1H)-One Derivatives Catalyzed by Organocatalyst: Benzoic Acid 苯甲酸催化一锅多组分合成3,4-二氢嘧啶-2-(1H)- 1衍生物的简单高效方法
Eurasian Journal of Analytical Chemistry Pub Date : 2023-01-01 DOI: 10.31489/2959-0663/1-23-8
Venkatesh B. Gopula, Mohsin K. Pathan
{"title":"Simple and Efficient Method for One Pot Multicomponent Synthesis of 3,4-Dihydropyrimidin-2-(1H)-One Derivatives Catalyzed by Organocatalyst: Benzoic Acid","authors":"Venkatesh B. Gopula, Mohsin K. Pathan","doi":"10.31489/2959-0663/1-23-8","DOIUrl":"https://doi.org/10.31489/2959-0663/1-23-8","url":null,"abstract":"The Biginelli reaction is one the useful multicomponent reactions and a very appropriate reaction for the synthesis of 3,4-dihydropyrimidin-2(1H)-ones derivatives. These 3,4-dihydropyrimidin-2(1H)-ones have biological and pharmacological properties which makes them a very important class of medicinal chemistry. Although they are an important class of medicinal chemistry, the syntheses of these compounds have been catalyzed by large number of strong Bronsted acids and Lewis acids under thermal conditions. Small organic molecules, organocatalysts, have been used as catalysts for the Biginelli reaction in a small number as compared to Bronsted acids and Lewis acid. Benzoic acid, which is a small organic molecule, although an acid, has never been tested for the synthesis of 3,4-dihydropyrimidin-2(1H)-ones. Benzoic acid is an inexpensive, non-toxic molecule, it has been successfully tested here as a catalyst for the one-pot three component synthesis of 3,4-dihydropyrimidin-2-(1H)-one derivatives via Biginelli reaction between β-keto ester, a variety of aromatic aldehydes and urea or thiourea under thermal conditions using 20 mol% benzoic acid in acetonitrile solvent refluxed for 12 h to give good to high yields. This synthetic method includes inexpensive, non-toxic, easily available benzoic acid as a catalyst and is carried out in a simple operational procedure.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"206 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81581056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Water Marking and its Application in Various Media Types 数字水印及其在各种媒体中的应用
Eurasian Journal of Analytical Chemistry Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018256
K. Sivaraman, G. Kavitha
{"title":"Digital Water Marking and its Application in Various Media Types","authors":"K. Sivaraman, G. Kavitha","doi":"10.29333/EJAC/2018256","DOIUrl":"https://doi.org/10.29333/EJAC/2018256","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"42 1","pages":"952-957"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75421311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote Power Monitoring, Computing and Controlling through GSM Network 基于GSM网络的远程电力监测、计算与控制
Eurasian Journal of Analytical Chemistry Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018243
G. Michael, R. Kavitha
{"title":"Remote Power Monitoring, Computing and Controlling through GSM Network","authors":"G. Michael, R. Kavitha","doi":"10.29333/EJAC/2018243","DOIUrl":"https://doi.org/10.29333/EJAC/2018243","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"136 1","pages":"877-884"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76380941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Error Detection and Correction Using Chinese Remainder Theorem in CDMA 基于中国剩余定理的CDMA错误检测与校正
Eurasian Journal of Analytical Chemistry Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018242
K. Subbulakshmi.
{"title":"Error Detection and Correction Using Chinese Remainder Theorem in CDMA","authors":"K. Subbulakshmi.","doi":"10.29333/EJAC/2018242","DOIUrl":"https://doi.org/10.29333/EJAC/2018242","url":null,"abstract":"In communication systems corruption of data and hacking of data is unavoidable. These are the major problems we are facing in communication system. This project presents an enhanced multiple error detection and correction scheme based on the Redundant Residue Number System (RRNS). RRNS is often used in parallel processing environments because of its ability to increase the robustness of information passing between the processors. The proposed multiple error correction scheme utilizes the Chinese Remainder Theorem (CRT) together with a novel algorithm that significantly simplifies the error correcting process for integers. This enhanced scheme is compared with the existing method and this enhanced scheme is used in the CDMA application.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"204 1","pages":"871-876"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77879169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Methodology for the Construction of Public-Private Key Pairs 一种构造公私密钥对的方法
Eurasian Journal of Analytical Chemistry Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018262
Kaliyamurthie K.P, R. Udayakumar
{"title":"A Methodology for the Construction of Public-Private Key Pairs","authors":"Kaliyamurthie K.P, R. Udayakumar","doi":"10.29333/EJAC/2018262","DOIUrl":"https://doi.org/10.29333/EJAC/2018262","url":null,"abstract":"Event-driven information and A* search have garnered improbable interest from both steganographers and system administrators in the last several years. In fact, few futurists would disagree with the visualization of neural networks, which embodies the confirmed principles of theory. Jayet, our new heuristic for heterogeneous theory, is the solution to all of these problems.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"26 1","pages":"992-998"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84134179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Using Big Data 大数据安全
Eurasian Journal of Analytical Chemistry Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018248
D. Jeyapriya, S. Theivasigamani
{"title":"Security Using Big Data","authors":"D. Jeyapriya, S. Theivasigamani","doi":"10.29333/EJAC/2018248","DOIUrl":"https://doi.org/10.29333/EJAC/2018248","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"10 1","pages":"913-917"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78598507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bank Management System 银行管理系统
Eurasian Journal of Analytical Chemistry Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018229
C. Geetha, Sri kanth, Saikat Kumar
{"title":"Bank Management System","authors":"C. Geetha, Sri kanth, Saikat Kumar","doi":"10.29333/EJAC/2018229","DOIUrl":"https://doi.org/10.29333/EJAC/2018229","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"35 1","pages":"783-787"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76739872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Architecting Thin Clients Using Scalable Archetypes 使用可伸缩原型构建瘦客户端
Eurasian Journal of Analytical Chemistry Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018261
Kaliyamurthie K.P, R. Udayakumar
{"title":"Architecting Thin Clients Using Scalable Archetypes","authors":"Kaliyamurthie K.P, R. Udayakumar","doi":"10.29333/EJAC/2018261","DOIUrl":"https://doi.org/10.29333/EJAC/2018261","url":null,"abstract":"Rasterization must work [9]. Given the current status of electronic modalities, electrical engineers particularly desire the simsulation of erasure coding, which embodies the essential principles of operating systems. Our focus in this paper is not on whether the well-known psychoacoustic algorithm for the understanding of IPv6 [7] is Turing complete, but rather on presenting an analysis of systems (OilyDab) [9].","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"44 1","pages":"985-991"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73843909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Malicious Attacks in Mobile Ad Hoc Networks (MANET) 移动自组网(MANET)中的恶意攻击检测
Eurasian Journal of Analytical Chemistry Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018244
G. Michael, R. Kavitha
{"title":"Detection of Malicious Attacks in Mobile Ad Hoc Networks (MANET)","authors":"G. Michael, R. Kavitha","doi":"10.29333/EJAC/2018244","DOIUrl":"https://doi.org/10.29333/EJAC/2018244","url":null,"abstract":"The highest security issue that is faced in current scenario in MANET is infrastructure centralization. The task routing and forwarding is achieved to the max only when the there is excellent cooperation among the participating nodes. By selfish act of few nodes, the process of forwarding is interrupted for reasons like saving the battery power. Malicious activities like Denial of Service (DoS) raise a security threat to MANET. Research and analysis of various security attacks is the focal point of this project. In this system DSR Protocol is extended with a feature of “node friendship“, which creates smooth cooperation in an adhoc environment. Based on the above work the concept of grey hole attack can be detected and eliminated.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"6 1","pages":"885-894"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74955606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信