Preferred Language
Articles
/
EBZ7oooBVTCNdQwC5qJW
Tubular Magnetic Shielding Scan (TMSS): A New Technique for Molecular Space Exploration. (i) The Case of Aromaticity of Benzene and [<i>n</i>]Paracyclophanes
...Show More Authors

Both traditional and novel techniques were employed in this work for magnetic shielding evaluation to shed new light on the magnetic and aromaticity properties of benzene and 12 [n]paracyclophanes with n = 3–14. Density functional theory (DFT) with the B3LYP functional and all-electron Jorge-ATZP and x2c-TZVPPall-s basis sets was utilized for geometry optimization and magnetic shielding calculations, respectively. Additionally, the 6-311+G(d,p) basis set was incorporated for the purpose of comparing the magnetic shielding results. In addition to traditional evaluations such as NICS/NICSzz-Scan, and 2D-3D σiso(r)/σzz(r) maps, two new techniques were implemented: bendable grids (BGs) and cylindrical grids (CGs) of ghost atoms (Bqs). BGs allow for the recording of magnetic shielding from the bent ring levels of [n]pCPs, while CGs provide tubular magnetic shielding scan (TMSS) maps detailing the magnetic shielding from a cylindrical region above and below the ring frame. Our findings suggest that smaller [n]pCPs with n < 6 exhibit deviations in the magnetic shielding above and below the ring, indicating a broken electron delocalization under the ring. In contrast, larger [n]pCPs tend to behave similarly to benzene in terms of magnetic shielding. Moreover, we found that shorter polymethylene chains of [n]pCPs exhibit significantly higher magnetic shielding interactions with the ring. Both of the above techniques offer new and promising tools for characterizing nonplanar aromatic compounds, thereby contributing to a deeper understanding of their magnetic and electronic properties.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Feb 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation Variables Effect on Gelation Temperature of Nefopam Hydrochloride intranasal in Situ Gel (Conference Paper) #
...Show More Authors

Nefopam (N.F.) HCl is a non-narcotic centrally-acting, non-opioid benzoxazocine analgesic to relieve acute and chronic pain. It exhibits low bioavailability (about 36%) due to its first-pass degradation in the liver.

Intranasal administration has been used as a new route for targeting active brain sites and enhancing the bioavailability of N.F. HCl bypassing hepatic metabolism.

In situ gel of N.F. HCl was prepared by the cold method using different concentrations of Poloxamer 407, Poloxamer 188, HPMC K4M, Carbapol 934, and Hyaluronic acid polymers.

The results show that identification tests are superimposed with references, solubility study shows that N.F. HCl is suitable to be administered intranasally; Compatibi

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Petroleum Science And Engineering
Effect of wettability on particle settlement behavior within Mono-Ethylene Glycol regeneration pre-treatment systems
...Show More Authors

This study was undertaken to diagnose routine settling problems within a third-party oil and gas companies’ Mono-Ethylene Glycol (MEG) regeneration system. Two primary issues were identified including; a) low particle size (<40 μm) resulting in poor settlement within high viscosity MEG solution and b) exposure to hydrocarbon condensate causing modification of particle surface properties through oil-wetting of the particle surface. Analysis of oil-wetted quartz and iron carbonate (FeCO₃) settlement behavior found a greater tendency to remain suspended in the solution and be removed in the rich MEG effluent stream or to strongly float and accumulate at the liquid-vapor interface in comparison to naturally water-wetted particles. As su

... Show More
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 05 2020
Journal Name
Advances In Structural Engineering
Strength compensation of deep beams with large web openings using carbon fiber–reinforced polymer sheets
...Show More Authors

This article presents the results of an experimental investigation of using carbon fiber–reinforced polymer sheets to enhance the behavior of reinforced concrete deep beams with large web openings in shear spans. A set of 18 specimens were fabricated and tested up to a failure to evaluate the structural performance in terms of cracking, deformation, and load-carrying capacity. All tested specimens were with 1500-mm length, 500-mm cross-sectional deep, and 150-mm wide. Parameters that studied were opening size, opening location, and the strengthening factor. Two deep beams were implemented as control specimens without opening and without strengthening. Eight deep beams were fabricated with openings but without strengthening, while

... Show More
View Publication
Crossref (16)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Removal of COD from Petroleum refinery Wastewater by Electro-Coagulation Process Using SS/Al electrodes
...Show More Authors
Abstract<p>In the present study, the effectiveness of a procedure of electrocoagulation for removing chemical oxygen demand (COD) from the wastewater of petroleum refinery has been evaluated. Aluminum and stainless steel electrodes were used as a sacrificial anode and cathode respectively. The effect of current density (4-20mAcm<sup>−2</sup>), pH (3-11), and NaCl concentration (0-4g/l) on efficiency of removal of chemical oxygen demand was investigated. The results have shown that increasing of current density led to increase the efficiency of COD removal while increasing NaCl concentration resulted in decreasing of COD removal efficiency. Effect of pH was found to be lowering COD re</p> ... Show More
View Publication
Scopus (35)
Crossref (20)
Scopus Crossref
Publication Date
Wed Aug 05 2020
Journal Name
Advances In Civil Engineering
Strength compensation of deep beams with large web openings using carbon fiber–reinforced polymer sheets
...Show More Authors

This article presents the results of an experimental investigation of using carbon fiber–reinforced polymer sheets to enhance the behavior of reinforced concrete deep beams with large web openings in shear spans. A set of 18 specimens were fabricated and tested up to a failure to evaluate the structural performance in terms of cracking, deformation, and load-carrying capacity. All tested specimens were with 1500-mm length, 500-mm cross-sectional deep, and 150-mm wide. Parameters that studied were opening size, opening location, and the strengthening factor. Two deep beams were implemented as control specimens without opening and without strengthening. Eight deep beams were fabricated with openings but without strengthening, while

... Show More
Scopus (15)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Apr 27 2018
Journal Name
Journal Of Periodontal Research
Potential role of periodontal pathogens in compromising epithelial barrier function by inducing epithelial‐mesenchymal transition
...Show More Authors
Background and Objective

Epithelial‐mesenchymal transition (EMT) is a process by which epithelial cells acquire a mesenchymal‐like phenotype and this may be induced by exposure to gram‐negative bacteria. It has been proposed that EMT is responsible for compromising epithelial barrier function in the pathogenesis of several diseases. However, the possible role of EMT in the pathogenesis of periodontitis has not previously been investigated. The aim of this study therefore was to investigate whether gram‐negati

... Show More
View Publication Preview PDF
Scopus (57)
Crossref (48)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
The Egyptian Journal Of Hospital Medicine
Changes in Interleukin-35 (IL-35), Anti-TSHR antibody and Human Insulin- like Growth Factor 1 Receptor (IGF1R) in Graves’ Disease Patients Treatedwith Radioactive Iodine
...Show More Authors

View Publication
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2&lt;sup&gt;m&lt;/sup&gt;) using FPGA by exponentiation to (2&lt;sup&gt;k&lt;/sup&gt;)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2&lt;sup&gt;m&lt;/sup&gt;) using FPGA by exponentiation to (2&lt;sup&gt;k&lt;/sup&gt;)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref