Both traditional and novel techniques were employed in this work for magnetic shielding evaluation to shed new light on the magnetic and aromaticity properties of benzene and 12 [n]paracyclophanes with n = 3–14. Density functional theory (DFT) with the B3LYP functional and all-electron Jorge-ATZP and x2c-TZVPPall-s basis sets was utilized for geometry optimization and magnetic shielding calculations, respectively. Additionally, the 6-311+G(d,p) basis set was incorporated for the purpose of comparing the magnetic shielding results. In addition to traditional evaluations such as NICS/NICSzz-Scan, and 2D-3D σiso(r)/σzz(r) maps, two new techniques were implemented: bendable grids (BGs) and cylindrical grids (CGs) of ghost atoms (Bqs). BGs allow for the recording of magnetic shielding from the bent ring levels of [n]pCPs, while CGs provide tubular magnetic shielding scan (TMSS) maps detailing the magnetic shielding from a cylindrical region above and below the ring frame. Our findings suggest that smaller [n]pCPs with n < 6 exhibit deviations in the magnetic shielding above and below the ring, indicating a broken electron delocalization under the ring. In contrast, larger [n]pCPs tend to behave similarly to benzene in terms of magnetic shielding. Moreover, we found that shorter polymethylene chains of [n]pCPs exhibit significantly higher magnetic shielding interactions with the ring. Both of the above techniques offer new and promising tools for characterizing nonplanar aromatic compounds, thereby contributing to a deeper understanding of their magnetic and electronic properties.
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreThis study has been developed axes of the search, including: Search (deliberative) language and idiomatically, and Description Language (b social phenomenon), and the definition of the theory of (acts of speech), and discussed the problem of the conflict between tradition and innovation, as defined objectively have a target aimed at reviving the deliberative thought when Arab scholars , and the balance between the actual done Arab and Western rhetoric, but Meet in intellectual necessity, a sober reading that preserve the Arab language prestige, and its position in the light of the growing tongue Sciences, as long as we have inherited minds unique, and heritage huge able to consolidate the Arab theory lingual in linguistics.
The aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive
... Show MoreTrimethoprim derivative Schiff bases are versatile ligands synthesized with carbonyl groups from the condensation of primary amines (amino acids). Because of their broad range of biological activity, these compounds are very important in the medical and pharmaceutical fields. Biological activities such as antibacterial, antifungal and antitumor activity are often seen. Transition metal complexes derived from biological activity Schiff base ligands have been commonly used.
The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreText categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accuracy th
... Show MoreThis review delves deep into the intricate relationship between urban planning and flood risk management, tracing its historical trajectory and the evolution of methodologies over time. Traditionally, urban centers prioritized defensive measures, like dikes and levees, with an emphasis on immediate solutions over long-term resilience. These practices, though effective in the short term, often overlooked broader environmental implications and the necessity for holistic planning. However, as urban areas burgeoned and climate change introduced new challenges, there has been a marked shift in approach. Modern urban planning now emphasizes integrated blue-green infrastructure, aiming to harmonize human habitation with water cycles. Resil
... Show More