Both traditional and novel techniques were employed in this work for magnetic shielding evaluation to shed new light on the magnetic and aromaticity properties of benzene and 12 [n]paracyclophanes with n = 3–14. Density functional theory (DFT) with the B3LYP functional and all-electron Jorge-ATZP and x2c-TZVPPall-s basis sets was utilized for geometry optimization and magnetic shielding calculations, respectively. Additionally, the 6-311+G(d,p) basis set was incorporated for the purpose of comparing the magnetic shielding results. In addition to traditional evaluations such as NICS/NICSzz-Scan, and 2D-3D σiso(r)/σzz(r) maps, two new techniques were implemented: bendable grids (BGs) and cylindrical grids (CGs) of ghost atoms (Bqs). BGs allow for the recording of magnetic shielding from the bent ring levels of [n]pCPs, while CGs provide tubular magnetic shielding scan (TMSS) maps detailing the magnetic shielding from a cylindrical region above and below the ring frame. Our findings suggest that smaller [n]pCPs with n < 6 exhibit deviations in the magnetic shielding above and below the ring, indicating a broken electron delocalization under the ring. In contrast, larger [n]pCPs tend to behave similarly to benzene in terms of magnetic shielding. Moreover, we found that shorter polymethylene chains of [n]pCPs exhibit significantly higher magnetic shielding interactions with the ring. Both of the above techniques offer new and promising tools for characterizing nonplanar aromatic compounds, thereby contributing to a deeper understanding of their magnetic and electronic properties.
In this paper we study the relation between the resolution of Weyl Module F K ) 3 , 4 , 4 (
in
characteristic-free mode and in the Lascoux mode (characteristic zero), more precisely we
obtain the Lascoux resolution of F K ) 3 , 4 , 4 (
in characteristic zero as an application of the
resolution of F K ) 3 , 4 , 4 (
in characteristic-free.
Key word : Resolution, Weyl module, Lascoux mode, divided power, characteristic-free.
The Karolinka earth-fill dam was constructed between 1977 and 1984 on the Stanovnice river above the town of Karolinka in the region of Vsetínsko in Czech Republic. Because of leakage on the downstream dam face due to technological indiscipline when filling dam layers during the dam construction stage, there were some steps to improve state dam safety. The final rehabilitation is to construct the diaphragm walls from self-hardening cement-bentonite suspension along the length of the dam. In addition to connecting the gallery and abutment (2 × 25 m long) by using jet piles. The article presents numerical modeling of safety factor evaluation associated with the state of the dam body and foundation; before, and after seal
... Show MoreNew types of hydrodesulfurization (HDS) catalyst Re-Ni-Mo/ γ-Al2O3 was prepared and tested separately with two prepared conventional HDS catalysts (Ni-Mo/ γ-Al2O3 and Co-Mo//γ-Al2O3) by using a pilot plant hydrotreatment unit. Activities of three prepared hydrodesulfurization catalysts were examined in hydrodesulfurization (HDS) of atmospheric gas oil at different temperatures 275 to 350 °C and LHSV 1 to 4 h-1, the reactions conducted under constant pressure 40 bar and H2/HC ratio 500 ml/ml .Moreover, the hydrogenation of aromatic (HAD) in gas oil has been studied. HDS was much improved by adding promoter Re to the Ni-Mo/Al2O3
... Show MoreNew types of hydrodesulfurization (HDS) catalyst Re-Ni-Mo/ γ-Al2O3 was prepared and tested separately with two prepared conventional HDS catalysts (Ni-Mo/ γ-Al2O3 and Co-Mo//γ-Al2O3) by using a pilot plant hydrotreatment unit. Activities of three prepared hydrodesulfurization catalysts were examined in hydrodesulfurization (HDS) of atmospheric gas oil at different temperatures 275 to 350 °C and LHSV 1 to 4 h-1, the reactions conducted under constant pressure 40 bar and H2/HC ratio 500 ml/ml .Moreover, the hydrogenation of aromatic (HAD) in gas oil has been studied. HDS was much improved by adding promoter Re to the Ni-Mo/Al2O3 catalyst. The results showed that Re-Ni-Mo/ γ-Al2O3 have more activity in desulfurization than Ni-Mo//γ-Al2O3
... Show MoreCoupling reaction of 2-amino benzoic acid with phenol gave the new bidentate azo ligand. The prepared ligand was identified by Microelemental Analysis, FT-IR and UV-Vis spectroscopic technique. Treatment of the prepared ligand with the following metal ions (CoII, NiII, CuII and ZnII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]. The prepared complexes were characterized using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentr
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
This paper deals with constructing mixed probability distribution from mixing exponential
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More