Ultrasonic-Assisted Deprotection of tert-Butyldimethylsilyl Ethers with Bromotrichloromethane in Methanol

2013 ◽  
Vol 830 ◽  
pp. 230-233 ◽  
Author(s):  
Jian Sun ◽  
Shan Shan Gong ◽  
Qi Sun

Treatment of tert-butyldimethylsilyl (TBDMS) ethers of nucleosides with bromo-trichloromethane (CBrCl3) in methanol under ultrasonic conditions provides a mild and efficient method for desilylation. The experimental results showed that the employment of ultrasonic could notably improve the reaction efficiency compared with thermal heating condition.

2013 ◽  
Vol 859 ◽  
pp. 337-340
Author(s):  
Qiang Wang ◽  
Guo Dong Liu ◽  
Shan Shan Gong ◽  
Qi Sun

Treatment of protected furanoses with FeCl3·6H2O in acetonitrile with microwave irradiation provides an efficient and mild protocol for regioselective removal of anomeric O-acetyl group. This method features cost efficient reagents, simple procedures, and high yields. The experimental results proved that microwave irradiation could notably shorten the reaction time and increase the product yield compared to the conventional thermal heating condition.


2014 ◽  
Vol 1023 ◽  
pp. 91-94 ◽  
Author(s):  
Qiang Wang ◽  
Shan Shan Gong ◽  
Qi Sun

A facile and efficient method for the synthesis of dinucleoside triphosphates with pyrimidine bases (Up3U, Cp3C, and Up3C) from the corresponding nucleoside 5′-phosphoropiperidates has been developed. The experimental results indicated that the employment of 4,5-dicyanoimidazole (DCI) as the activator could notably promote the coupling reaction.


2013 ◽  
Vol 830 ◽  
pp. 155-158 ◽  
Author(s):  
Qiang Wang ◽  
Guo Dong Liu ◽  
Shan Shan Gong ◽  
Qi Sun

Treatment of peracetylated pyranoses with FeCl3·6H2O in acetonitrile under microwave conditions provides an efficient and mild method for regioselective deprotection of anomeric O-acetyl group. The experimental results indicated that the employment of microwave could notably improve the reaction efficacy compared with the conventional heating condition.


2011 ◽  
Vol 346 ◽  
pp. 731-737 ◽  
Author(s):  
Jin Feng Yang ◽  
Man Hua Liu ◽  
Hui Zhao ◽  
Wei Tao

This paper presents an efficient method to detect the fastener based on the technologies of image processing and optical detection. As feature descriptor, the Direction Field of fastener image is computed for template matching. This fastener detection method can be used to determine the status of fastener on the corresponding track, i.e., whether the fastener is on the track or missing. Experimental results are presented to show that the proposed method is computation efficiency and is robust for fastener detection in complex environment.


2012 ◽  
Vol 581-582 ◽  
pp. 326-329
Author(s):  
Zhe Zhang ◽  
Yi He Li ◽  
Hua Xiao ◽  
Chi Zhou Tu ◽  
Chun Hua Wang

1-(2-Methacryloyloxy)ethyl-3-butylimidazolium bromide, a kind of functional ionic liquid containing ester group, was synthesized by two synthesis methods, denoted as thermal heating method and ultrasonic-assisted method. The optimal synthesis condition of the thermal heating method is discussed. Comparison of the two methods shows that ultrasound significantly enhances the efficiency of the reaction. The ultrasonic-assisted method is quite promising in synthesis of ionic liquids with mild condition and high efficiency.


2011 ◽  
Vol 2011 ◽  
pp. 1-11 ◽  
Author(s):  
Dan Grois ◽  
Evgeny Kaminsky ◽  
Ofer Hadar

This work relates to the developing and implementing of an efficient method and system for the fast real-time Video-in-Video (ViV) insertion, thereby enabling efficiently inserting a video sequence into a predefined location within a pre-encoded video stream. The proposed method and system are based on dividing the video insertion process into two steps. The first step (i.e., the Video-in-Video Constrained Format (ViVCF) encoder) includes the modification of the conventional H.264/AVC video encoder to support the visual content insertion Constrained Format (CF), including generation of isolated regions without using the Frequent Macroblock Ordering (FMO) slicing, and to support the fast real-time insertion of overlays. Although, the first step is computationally intensive, it should to be performed only once even if different overlays have to be modified (e.g., for different users). The second step for performing the ViV insertion (i.e., the ViVCF inserter) is relatively simple (operating mostly in a bit-domain), and is performed separately for each different overlay. The performance of the presented method and system is demonstrated and compared with the H.264/AVC reference software (JM 12); according to our experimental results, there is a significantly low bit-rate overhead, while there is substantially no degradation in the PSNR quality.


2020 ◽  
Author(s):  
sudershan gondi

<div>Abstracts: A convenient, and efficient method for Transcarbamation and conversion of</div><div>benzyl carbamates to amide using potassium carbonate in alcohols under heating condition</div><div>is described.</div>


2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Naveed Ahmed Azam ◽  
Umar Hayat ◽  
Ikram Ullah

Elliptic curves (ECs) are considered as one of the highly secure structures against modern computational attacks. In this paper, we present an efficient method based on an ordered isomorphic EC for the generation of a large number of distinct, mutually uncorrelated, and cryptographically strong injective S-boxes. The proposed scheme is characterized in terms of time complexity and the number of the distinct S-boxes. Furthermore, rigorous analysis and comparison of the newly developed method with some of the existing methods are conducted. Experimental results reveal that the newly developed scheme can efficiently generate a large number of distinct, uncorrelated, and secure S-boxes when compared with some of the well-known existing schemes.


2018 ◽  
Vol 10 (2) ◽  
pp. 1-22 ◽  
Author(s):  
Kai Chen ◽  
Dawen Xu

Reversible data hiding in the encrypted domain is an emerging technology, as it can preserve the confidentiality. In this article, an efficient method of reversible data hiding in encrypted images is proposed. The cover image is first partitioned into non-overlapping blocks. A specific modulo addition operation and block-scrambling operation are applied to obtain the encrypted image. The data-hider, who does not know the original image content, may reversibly embed secret data based on the homomorphic property of the cryptosystem. A scale factor is utilized for selecting embedding zone, which is scalable for different capacity requirements. At the receiving end, the additional data can be extracted if the receiver has the data-hiding key only. If the receiver has the encryption key only, he/she can recover the original image approximately. If the receiver has both the data-hiding key and the encryption key, he can extract the additional data and recover the original content without any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.


2014 ◽  
Vol 23 (01) ◽  
pp. 1450001 ◽  
Author(s):  
HECTOR PETTENGHI ◽  
SORIN COTOFANA ◽  
LEONEL SOUSA

In this paper, an efficient method for designing memoryless modulo {2n ± k} multipliers is proposed, which can be used to compose larger residue number system (RNS) moduli sets. This technique includes a novel choice for the weights associated with the partial products of the inputs is used, which improves the performance of the resulting multipliers. Experimental results suggest that the use of this choice of input weights in the structure herein proposed, provides an average improvement of 36.3% in area-delay-product (ADP) in comparison with the related state-of-the-art. Furthermore, the structures presented in the state-of-the-art are also improved by 43.5% in ADP.


Sign in / Sign up

Export Citation Format

Share Document