Both traditional and novel techniques were employed in this work for magnetic shielding evaluation to shed new light on the magnetic and aromaticity properties of benzene and 12 [n]paracyclophanes with n = 3–14. Density functional theory (DFT) with the B3LYP functional and all-electron Jorge-ATZP and x2c-TZVPPall-s basis sets was utilized for geometry optimization and magnetic shielding calculations, respectively. Additionally, the 6-311+G(d,p) basis set was incorporated for the purpose of comparing the magnetic shielding results. In addition to traditional evaluations such as NICS/NICSzz-Scan, and 2D-3D σiso(r)/σzz(r) maps, two new techniques were implemented: bendable grids (BGs) and cylindrical grids (CGs) of ghost atoms (Bqs). BGs allow for the recording of magnetic shielding from the bent ring levels of [n]pCPs, while CGs provide tubular magnetic shielding scan (TMSS) maps detailing the magnetic shielding from a cylindrical region above and below the ring frame. Our findings suggest that smaller [n]pCPs with n < 6 exhibit deviations in the magnetic shielding above and below the ring, indicating a broken electron delocalization under the ring. In contrast, larger [n]pCPs tend to behave similarly to benzene in terms of magnetic shielding. Moreover, we found that shorter polymethylene chains of [n]pCPs exhibit significantly higher magnetic shielding interactions with the ring. Both of the above techniques offer new and promising tools for characterizing nonplanar aromatic compounds, thereby contributing to a deeper understanding of their magnetic and electronic properties.
Attention increased to the topic of academic accreditation by the university as a modern philosophy by which to improve its performance and provide high-quality education. Universities and colleges in general and Iraqi universities and colleges in particular have begun interest in accreditation and desire to get it. So starting from the pursuit of the Administration and Economics College / Baghdad University in obtaining accreditation of Association to Advance Collegiate Schools of Business (AACSB) The research is present which aims to determine the level of application (AACSB) International standards at the College of Administration and Economics / Baghdad University in preparation to get its accreditation in the future. Researc
... Show MoreAbstract Iraq has an important place in the regional and international balance, and the competition among countries has increased in rapprochement with Iraq, not only for its geography or its privileged location, but because it has many other components that make regional and international countries want to strengthen their relations with it (Regional and international powers). In addition to that, Iraq has become increasingly important for these international and regional powers after its victory over the terrorist organization (ISIS), which proved an important fact that Iraq represents the most important pillars in the international balance.
Rudimentary non-communicating functional uterine horn with unicornuate uterus, originating from anomalous embryological development of one Mullerian duct, is prone to different complications either at the gynecological or obstetrical level such as chronic pelvic pain, hematometra, subfertility and decreased quality of life. This unique case report presents a 14-year-old female with a history of severe chronic pelvic pain. She was diagnosed with Familial Mediterranean Fever (FMF) and had an appendectomy for suspected appendicitis within the symptoms’ interval. Ultrasound showed a right 5*6 cm right complex cystic mass assuming ovarian in place. She underwent a suspected endometrioma cystectomy operation and was diagnosed with left unico
... Show MoreThe main focus of research is on how to achieve the internal and external dimensions of corporate social responsibility through human resources management strategies, which is a major of research aimed. The main problem of this research was confirmed, which confirms that there is an unclear role for social responsibility, lack of human resources management strategies, and ambiguity of roles in the municipality under study. The diagnose of the problem and determining the gap between the internal and external dimensions of social responsibility and human resources management was identified, which attacked the researcher's attention to navigate in this subject, look for the reasons for the gaps and try to reduce them. The case study
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the