Both traditional and novel techniques were employed in this work for magnetic shielding evaluation to shed new light on the magnetic and aromaticity properties of benzene and 12 [n]paracyclophanes with n = 3–14. Density functional theory (DFT) with the B3LYP functional and all-electron Jorge-ATZP and x2c-TZVPPall-s basis sets was utilized for geometry optimization and magnetic shielding calculations, respectively. Additionally, the 6-311+G(d,p) basis set was incorporated for the purpose of comparing the magnetic shielding results. In addition to traditional evaluations such as NICS/NICSzz-Scan, and 2D-3D σiso(r)/σzz(r) maps, two new techniques were implemented: bendable grids (BGs) and cylindrical grids (CGs) of ghost atoms (Bqs). BGs allow for the recording of magnetic shielding from the bent ring levels of [n]pCPs, while CGs provide tubular magnetic shielding scan (TMSS) maps detailing the magnetic shielding from a cylindrical region above and below the ring frame. Our findings suggest that smaller [n]pCPs with n < 6 exhibit deviations in the magnetic shielding above and below the ring, indicating a broken electron delocalization under the ring. In contrast, larger [n]pCPs tend to behave similarly to benzene in terms of magnetic shielding. Moreover, we found that shorter polymethylene chains of [n]pCPs exhibit significantly higher magnetic shielding interactions with the ring. Both of the above techniques offer new and promising tools for characterizing nonplanar aromatic compounds, thereby contributing to a deeper understanding of their magnetic and electronic properties.
In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreThe present paper concern with minimax shrinkage estimator technique in order to estimate Burr X distribution shape parameter, when prior information about the real shape obtainable as original estimate while known scale parameter.
Derivation for Bias Ratio, Mean squared error and the Relative Efficiency equations.
Numerical results and conclusions for the expressions mentioned above were displayed. Comparisons for proposed estimator with most recent works were made.
Any city that has such a market and is organized, organized and established
Mini
And respect
Freedom of expression
Profile.
Conflict resolution and conflict resolution
Political
Which affected the growth of some markets
And religious th
The search for the return of economic and cultural activity and the emigration of some others
Cultural exchange and trade, which in turn
Al-Rifaie
We took the problem that we are experiencing
Menia, the holy city of Karbala in the market organization, has suffered from fierce attacks
Economic and heritage
e
As well as tourism and tourism, as it depends on the abundance of visitors, tourists and residents in terms of needs and motivation
Resource
Importance of Arabic language stemming algorithm is not less than that of other languages stemming in Information Retrieval (IR) field. Lots of algorithms for finding the Arabic root are available and they are mainly categorized under two approaches which are light (stem)-based approach and root-based approach. The latter approach is somehow better than the first approach. A new root-based stemmer is proposed and its performance is compared with Khoja stemmer which is the most efficient root-based stemmers. The accuracy ratio of the proposed stemmer is (99.7) with a difference (1.9) with Khoja stemmer.
There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
This manuscript presents a new approach to accurately calculating exponential integral function that arises in many applications such as contamination, groundwater flow, hydrological problems and mathematical physics. The calculation is obtained with easily computed components without any restrictive assumptions
A detailed comparison of the execution times is performed. The calculated results by the suggested approach are better and faster accuracy convergence than those calculated by other methods. Error analysis of the calculations is studied using the absolute error and high convergence is achieved. The suggested approach out-performs all previous methods used to calculate this function and this decision is
... Show MoreTI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreThe aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
THE ACTUAL SOCIETY MODEL
Our society model has been showing signs of exhaustion since the end of the XX century. The recent appearance of the Covid-19 virus is another consequence of humanity's distance from Nature and the environment it inhabits. Also, climate change, environmental deterioration, loss of biodiversity, overexploitation of natural resources, and social inequality are some of the consequences derived from this separation between society and Nature. We must change our operating habits. Inevitably from a society based on the market, hyper consumption, fossil energy and individual enrichment at all costs, we will have to change to another
... Show MoreIn paper, we study the impact of the rotationn inclined magnetic felid and inclined symmetric channel with slip condition on peristaltic transport using incompressible non-Newtonian fluid. Slip conditions for the concentration and heat transfer are considered. We use the conditions on the fluid, namely infinite wavelength and low - Reynolds number to simplify the governed equations that described - motion flow, energy and concentration. These equations ofroblem are solved by the perturbation technique and restricted the number of Bingham to a small value to find the final expression of the stream function. The Bingham number, Brinkman number, Soret number, Dufour number, temperature, Hartman number and other parameters are teste
... Show More