Numerous compounds containing urea bridge and biurea moieties are used in a variety of fields, especially as drugs and pesticides. To search for novel, environmentally benign and ecologically safe pesticides with unique modes of action, four series of novel triazone analogues containing urea, thiourea, biurea, and thiobiurea bridge, respectively, were designed and synthesized, according to various calcium ion channel inhibitors which act on transient receptor potential protein. Their structures were characterized by [Formula: see text] NMR, [Formula: see text] NMR, and HRMS. The insecticidal activities of the new compounds were obtained. The bioassay results indicated that compounds containing a thiourea bridge and a thiobiurea bridge exhibited excellent insecticidal activities against bean aphid. Specifically, compounds [Formula: see text], [Formula: see text], and [Formula: see text] exhibited 85, 90, and 95 % activities, respectively, at 10 mg/kg. Compounds [Formula: see text] (30 %), [Formula: see text] (35 %), [Formula: see text] (30 %), and [Formula: see text] (40 %) exhibited the approximate aphicidal activity of pymetrozine (30 %) at 5 mg/kg. In addition, some target compounds exhibited insecticidal activities against lepidopteran pests. From a molecular design standpoint, the information obtained in this study could help in the further design of new derivatives with improved insecticidal activities.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1007/s11030-016-9687-6 | DOI Listing |
Langmuir
January 2025
Department of Chemical Engineering, Indian Institute of Technology, Guwahati 781039, Assam, India.
Self-organized contact line instabilities (CLI) of a macroscopic liquid crystal (LC) droplet can be an ingenious pathway to generate a large collection of miniaturized LC drops. For example, when a larger drop of volatile solvent (e.g.
View Article and Find Full Text PDFSci Rep
January 2025
Department of Psychology, Bryn Mawr College, Bryn Mawr, PA, USA.
Persuasion plays a crucial role in human communication. Yet, convincing someone to change their mind is often challenging. Here, we demonstrate that a subtle linguistic device, generic-you (i.
View Article and Find Full Text PDFMath Ann
July 2024
Department of Mathematics, Virginia Tech, Blacksburg, VA 24061 USA.
In this paper we show that if a compact set , , has Hausdorff dimension greater than when or when , then the set of congruence class of simplices with vertices in has nonempty interior. By set of congruence class of simplices with vertices in we mean where . This result improves the previous best results in the sense that we now can obtain a Hausdorff dimension threshold which allow us to guarantee that the set of congruence class of triangles formed by triples of points of has nonempty interior when as well as extending to all simplices.
View Article and Find Full Text PDFPLoS One
January 2025
Department of Basic Sciences, Preparatory Year, King Faisal University, Al-Ahsa, Saudi Arabia.
Our study presents a novel orbit with s-convexity, for illustration of the behavior shift in the fractals. We provide a theorem to demonstrate the escape criterion for transcendental cosine functions of the type Tα,β(u) = cos(um)+αu + β, for [Formula: see text] and m ≥ 2. We also demonstrate the impact of the parameters on the formatted fractals with numerical examples and graphical illustrations using the MATHEMATICA software, algorithm, and colormap.
View Article and Find Full Text PDFSci Rep
January 2025
Department of Computer Science and Information Systems, Birla Institute of Technology and Science-Pilani, Hyderabad Campus, Hyderabad, 500078, India.
The motivation for this article stems from the fact that medical image security is crucial for maintaining patient confidentiality and protecting against unauthorized access or manipulation. This paper presents a novel encryption technique that integrates the Deep Convolutional Generative Adversarial Networks (DCGAN) and Virtual Planet Domain (VPD) approach to enhance the protection of medical images. The method uses a Deep Learning (DL) framework to generate a decoy image, which forms the basis for generating encryption keys using a timestamp, nonce, and 1-D Exponential Chebyshev map (1-DEC).
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!