In the current study, a direct method was used to create a new series of charge-transfer complexes of chemicals. In a good yield, new charge-transfer complexes were produced when different quinones reacted with acetonitrile as solvent in a 1:1 mole ratio with N-phenyl-3,4-selenadiazo benzophenone imine. By using analysis techniques like UV, IR, and 1H, 13C-NMR, every substance was recognized. The analysis's results matched the chemical structures proposed for the synthesized substances. Functional theory of density (DFT)
has been used to analyze the molecular structure of the produced Charge-Transfer Complexes, and the energy gap, HOMO surfaces, and LUMO surfaces have all been created throughout the geometry optimization process utilizing the base set of 3–21G geometrical structures. The molecular geometry and contours for compounds with charge-transfer complexes have been evaluated during the process of geometrical optimization. By investigating the interactions between donor and acceptor, we have also been contrasting the energies (HOMO
energies) of the chemicals in charge-transfer complexes. For molecules containing charge-transfer complexes, the lower case, electronegativity, ionization potential, electron affinity, and electrophilicity have all been calculated and studied.
Existence of these soils, sometimes with high gypsum content, caused difficult problems to the buildings and strategic projects due to dissolution and leaching of gypsum by the action of waterflow through soil mass. In this research, a new technique is adopted to investigate the performance of replacement and geosynthetic reinforcement materials to improve the gypseous soil behavior through experimential set up manufactured loaclally specially for this work. A series of tests were carried out using steel container (600*600*500) mm. A square footing (100*100) mm was placed at the center of the top surface of the bed soil. The results showed that the most effective thickness for the dune sand layer with geotextile at the interface, within
... Show MoreThis paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak. A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.
What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does
... Show MoreObjective (s): To determine proportion of anemia among sample of Pregnant women. To identify factors
associated with the anemia (Maternal age, maternal education, gestational age, parity, gravidity, birth
interval, smoking, taking iron supplements and dietary habits).
Methodology: A cross-sectional study conducted at Al- washash & Bab-almoadham primary health care
centers. The sample was selected by (non-probability convenient sampling) and sample size was (550).
The study started from 1st March 2011 to 30th of March 2012. The data was collected by direct interview
using special questionnaire to obtained socio-demographic information.
Results: the result shows that mean age of the subjects was 26.5± 7.5 years, 8
This paper analyzes a piled-raft foundation on non-homogeneous soils with variable layer depth percentages. The present work aims to perform a three-dimensional finite element analysis of a piled-raft foundation subjected to vertical load using the PLAXIS 3D software. Parametric analysis was carried out to determine the effect of soil type and initial layer thickness. The parametric study showed that increasing the relative density from 30 % to 80 % of the upper sand layer and the thickness of the first layer has led to an increase in the ultimate load and a decrease in the settlement of piled raft foundations for the cases of sand over weak soil. In clay over weak soil, the ultimate load of the piled raft foundation w
... Show MoreThis systematic review aimed to investigate the relation between orthodontic treatment (OT) and the incidence of the gingival black triangle (GBT) after completing treatment with a fixed orthodontic appliance, as well as the associated risk factors and the level of alveolar bone. Electronic and hand searches were conducted in three electronic databases for relevant articles published up to March 2022. Retrieved articles went through a two-step screening procedure, and the risk of bias (RoB) was assessed by the Joanna Briggs Institute checklists. The incidence of GBT after OT was set as the primary outcome, while the secondary outcomes were the risk factors associated with GBT and alveolar bone loss following OT. Out of 421 papers, 5
... Show MoreBackground. After tooth extraction, alveolar bone resorption is inevitable. This clinical phenomenon challenges dental surgeons aiming to restore esthetic and function. Alveolar ridge preservation can be applied to minimize dimensional changes with a new socket grafting material, an autogenous dentin graft, produced by mechanically and chemically processing natural teeth. This study assessed the safety and efficacy of using autogenous dentin biomaterial in alveolar ridge preservation. Materials and Methods. Patients with nonrestorable maxillary anterior teeth bounded by natural sound teeth were included in this study. After a detailed clinical and tomographic examination, eligible participants were randomly allocated into two groups
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More