The activation and reaction energies of the C-C and C-H bonds cleavage in pyrene molecule are calculated applying the Density Functional Theory and 6-311G Gaussian basis. Different values for the energies result for the different bonds, depending on the location of the bond and the structure of the corresponding transition states. The C-C bond cleavage reactions include H atom migration, in many cases, leading to the formation of CH2 groups and H-C≡C- acetylenic fragments. The activation energy values of the C-C reactions are greater than 190.00 kcal/mol for all bonds, those for the C-H bonds are greater than 160.00 kcal/mol. The reaction energy values for the C-C bonds range between 56.497 to 191.503 kcal/mol. As for the C-H cleavage reactions the activation energies range from 163.535 to 165.116 kcal/mol, the reaction energies are nearly constant, 117.500kcal/mol. The geometries of the transition states and reaction products are discussed too.
In this research, the X-ray diffraction pattern was used, which was obtained experimentally after preparation of barium oxide powder. A program was used to analyze the X-ray diffraction lines of barium oxide nanoparticles, and then the particle size was calculated by using the Williamson-Hall method, where it was found that the value of the particle size is 25.356 nm. Also, the dislocation density was calculated, which is equal to1.555 x1015 (lines/nm2), and the value of the unit cell number was also calculated, as it is equal to 23831.
Porous silicon (PS) layers were formed on n-type silicon (Si) wafers using Photo- electrochemical Etching technique (PEC) was used to produce porous silicon for n-type with orientation of (111). The effects of current density were investigated at: (10, 20, 30, 40, and50) mA/cm2 with etching time: 10min. X-ray diffraction studies showed distinct variations between the fresh silicon surface and the synthesized porous silicon. The maximum crystal size of Porous Silicon is (33.9nm) and minimum is (2.6nm) The Atomic force microscopy (AFM) analysis and Field Emission Scanning Electron Microscope (FESEM) were used to study the morphology of porous silicon layer. AFM results showed that root mean square (RMS) of roughness and the grain size of p
... Show MoreThe practice of art is an inevitable result imposed by the circumstances surrounding the human being, as he needs some knowledge associated with raw materials, tools and methods to develop skills in the formation of elements of the work of art in new ways that give a decent artistic appearance to the work of art. Through the exploratory study carried out by the researcher, which included asking the following question to the third grade students, Department of Art Education:
What types of materials are used in handicrafts and from which sources are they obtained? Through the answers, the problem of research was founded as follows:
-Are the products of students of the Department of Art Education in the handicraft material d
... Show MoreThe current research dealt with the study of space compatibility and its role in enhancing the functional aspect of the design of the interior spaces of isolation hospitals by finding a system or format that is compatible with the nature of the changes occurring in the structure and function of the space system, as well as contributing to enhancing compatibility between the functional aspect and the interior space. Therefore, the designer must The interior is the study of the functional and spatial aspects as they are the basic aspects for achieving suitability, and through the interaction between the person and the place, the utilitarian performance characteristics are generated that the interior designer is interested in and tries to d
... Show MoreThe contractual imbalance is perceived today by the majority of the doctrine as being one of the pitfalls to the execution of the contracts. As a result, most legislations grant judges the power to intervene to restore it. Granting the judge the power to complete the contract raises the question of the extent to which the judge can obtain such power. Is it an absolute authority that is not limited? If so, is it a broad discretion in which the judge operates in his conscience, or is it a power of limited scope by specific legal texts and conventions? This is what we will try to answer in this research.
At the beginning of the twentieth century distorting handling totalitarian phenomena of art, which can be called the stage of the test, transition from the theory of ideal theory and other realistic is not cushy, since it requires vision and reading and other concepts, and in light of this dialectic manifested research problem by asking the following Is affected by the design idealism and realism. Through the above mentioned questions, the researcher found rationale for addressing this problem, the study through his research, which is marked (idealism and realism in a comparative study design). And demonstrated the importance of research in the identification of the concept and the effectiveness of the two theories idealism and realism a
... Show MoreAromaticity, antiaromaticity and chemical bonding in the ground (S0), first singlet excited (S1) and lowest triplet (T1) electronic states of disulfur dinitride, S2N2, were investigated by analysing the isotropic magnetic shielding, σiso(r), in the space surrounding the molecule for each electronic state. The σiso(r) values were calculated by state-optimized CASSCF/cc-pVTZ wave functions with 22 electrons in 16 orbitals constructed from gauge-including atomic orbitals (GIAOs). The S1 and T1 electronic states were confirmed as 11Au and 13B3u, respectively, through linear response CC3/aug-cc-pVTZ calculations of the vertical excitation energies for eight singlet (S1–S8) and eight triplet (T1–T8) electronic states. The aromaticities of S
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreIn this paper, the researchers investigate Prime Minister Benjamin Netanyahu's speech before a joint session of the US Congress on July 25, 2024. The researchers primarily aim at highlighting the ideology behind Netanyahu's speech by using qualitative research through the application of critical discourse analysis (CDA), which is employed here in in order to show how certain linguistic choices can manipulate and determine concepts related to power and ideology. The CDA method used is Discourse Historical Approach with the main focus on argumentation management through discursive strategies. The researchers adopt DHA by Wodak (2009) with focusing on the taxonomy of social actor representation by Van Leeuwen (2008). The study reveals th
... Show More