The crystal structures of a new polymorph and seven new derivatives of 2-(1-phenyl-1H-1,2,3-triazol-4-yl)pyridine have been characterized and examined along with three structures from the literature to identify trends in their intermolecular contact patterns and packing arrangements in order to develop an insight into the crystallization behaviour of this class of compound. Seven unique C-H...X contacts were identified in the structures and three of these are present in four or more structures, indicating that these are reliable supramolecular synthons. Analysis of the packing arrangements of the molecules using XPac identified two closely related supramolecular constructs that are present in eight of the 11 structures; in all cases, the structures feature at least one of the three most common intermolecular contacts, suggesting a clear relationship between the intermolecular contacts and the packing arrangements of the structures. Both the intermolecular contacts and packing arrangements appear to be remarkably consistent between structures featuring different functional groups, with the expected exception of the carboxylic acid derivative 4-(4-(pyridin-2-yl)-1H-1,2,3-triazol-1-yl) benzoic acid (L11), where the introduction of a strong hydrogen-bonding group results in a markedly different supramolecular structure being adopted. The occurrence of these structural features has been compared with the packing efficiency of the structures and their melting points in order to assess the relative favourability of the supramolecular structural features in stabilizing the crystal structures.
In this paper thermo-hydrodynamic characteristics were investigated experimentally for a new type shell-helical coiled tube heat exchanger used as a storage tank of closed loop solar water heater system. Triple concentric helical coils were made of copper tubes of (12.5mm OD and 10mm ID) with coils diameter of (207, 152.2, 97mm) for outer, middle and inner coils respectively. The experiments were carried out during a clear sky days of (March and April 2012). The parameters studied in this work are: history of average temperature of shell side of the storage tank, collector heat gain, heat rejected from coils to shell side of the storage tank, collector efficiency, thermal effectiveness of the heat exchanger (storage tank), and pressure d
... Show MoreIn October 2019, Iraq and Lebanon witnessed widespread protests, which aroused the interest of the media, as they began with demands for the provision of services, then escalated with the overthrow of the political system. The researchers chose a satellite channel that represents a direction for a country accused of entering the line of protests. This paper aims to analyze the main bulletin of Al-Alam channel to find out how it deals with the protests in the news. It is classified descriptively, using the survey method and the method of content analysis. The study community was represented by the main news bulletin of Al-Alam channel. The researchers adopted a deliberate sample for the period from 1/10/2019 to
... Show MoreThe novel is the revelation of the attitudes of every age. And the writers do not know the winner of their stroke to express these events، The research has been working on a descriptive-analytical approach based on the American Comparative School، Al-Shahez's novel explores the work of the nobly and the film by Hamoun by Dariush Mehrjui By relying on the main characters of these two narratives, they depict a picture of Egypt and Iran From the symbolic lines of these works. In fact, the authors of this research have tried to initiate the introduction and analysis of these two works In fact, the authors of this research have tried to initiate the introduction and analysis of these two works.
The results of the research show that
... Show MoreThe reaction of ethylenediamine with [2,4,6-trihydroxyacetophenon] and KOH (Schiff Base) to gives the new tetradentate ligand 2-(1-{2-{1-2,6-Dihydroxy-4-methyl phenyl)ethyliden amino}- ethylimino}-ethyl-benzene- 1,2,5-triol [HCl]. This ligand was reacted with some metal ions (Cu(II), Co(II), Ni(II), Zn(II), and Cd(II)) in methanol with (1:1) metal : ligand ratio to give a series of new complexes of the general formula [M(H4L)], where: M= Cu(11), Co(II), Ni(II), Zn(II), and Cd(II). All compounds were characterized by spectroscopic methods [I.R, U.V.-Vis, C.H.N., analysis H.P.L.C, atomic absorption, magnetic susceptibility, (EI-mass for the ligand)], and microanalysis along with conductivity measurements
... Show MoreThe effects of gamma irradiation on the structure of ZnS films , which preparing by flash evaporation method, are studied using XRD. Two peaks of (111), (220) orientations are appeared in X ray chart indicating the cubic phase of the films .The lattice parameter, grain size, average internal stress, microstrain, dislocation density and degree of preferred orientation in the film are calculated and correlated with gamma irradiation.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables. The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.
... Show MoreThe international financial accounting and reporting standards IFRS/IAS represent the set of rules and foundations that the economic entity must follow in the measurement, presentation, and disclosure of the elements of the financial statements, the implementation of adopting the international financial reporting standards contributes to improving the qualitative characteristics of accounting information, so the current research aims to explain the role of adopting the International Accounting Standard (IAS) in improving the qualitative characteristics as well as analyzing the impact of the adoption of IAS.1 in improving the qualitative characteristics of accounting information within the financi
... Show More