Numerous integral and local electron density’s topological parameters of significant metal-metal and metal-ligand bonding interactions in a trinuclear tetrahydrido cluster [(Cp* Ir) (Cp Ru)2 (μ3-H) (μ-H)3]1 (Cp = η5 -C5Me5), (Cp* = η5 -C5Me4Et) were calculated and interpreted by using the quantum theory of atoms in molecules (QTAIM). The properties of bond critical points such as the delocalization indices δ (A, B), the electron density ρ(r), the local kinetic energy density G(r), the Laplacian of the electron density ∇2ρ(r), the local energy density H(r), the local potential energy density V(r) and ellipticity ε(r) are compared with data from earlier organometallic system studies. A comparison of the topological processes of different atom-atom interactions has become possible thanks to these results. In the core of the heterometallic tetrahydrido cluster, the Ru2IrH4 part, the calculations showed that there are no bond critical points (BCPs) or identical bond paths (BPs) between Ru-Ru and Ru-Ir. The distribution of electron densities is determined by the position of bridging hydride atoms coordinated to Ru-Ru and Ru-Ir, which significantly affects the bonds between these transition metal atoms. On the other hand, the results confirm that the cluster under study contains a 7c–11e bonding interaction delocalized over M3H4, as shown by the non-negligible delocalization index calculations. The small values for ρ(b) above zero, together with the small values, again above zero, for Laplacian ∇2ρ(b) and the small positive values for total energy density H(b), are shown by the Ru-H and Ir-H bonds in this cluster is typical for open-shell interactions. Also, the topological data for the bond interactions between Ir and Ru metal atoms with the C atoms of the cyclopentadienyl Cp ring ligands are similar. They show properties very identical to open-shell interactions in the QTAIM classification.
|
The international organizations showed their interest in the marketable public relations, with their activities, means and strategies, they play a crucial role in marketing products, services and ideas of the institution. They are considered to be the link between the company and its public, They are responsible for presenting the institution to the public, with honest transmission of the information. This gives a good impression to the institution, in a way the institution and its products become consistent with the needs and interests of the public. Based on this, the research aims to identify the strategies used by the marketable public relations internationally. The r |
The main problem established by a discovery of a thyroid nodule is to discriminate between a benign and malignant lesion. Differential diagnosis between follicular thyroid cancer (FTC) and benign follicular thyroid adenoma (FTA) is a great challenge for even an experienced pathologist and requires special effort. A developing number of some encouraging IHC markers for the differential diagnosis of thyroid lesions have emerged, including, Hector Battifora mesothelial (HBME-1) and galectin-3 (Gal-3). There was significant positive correlation between Galectin-3 and HBME-1 in follicular carcinoma and follicular variant of papillary carcinoma (r= 0.380, P= 0.041) and (r= 0.315, P=0.047) respectively. There was no significant correlation between
... Show MoreAeromonas hydrophila have been isolated as a cause of a cute gastroenteritis in 23 (5.6%) of 410 patients. Other bacterial enteropathogens have been isolated from 387 patients with diarrhea, were 19 different strains. A. hydrophila occurred more commonly in children with acute diarrhea, the results showed that 18(78.26%) isolates of A. hydrophila found in children under 10 years old ,distributed to 10(43.47%) in male and 8(34.78%) in female ,and in adults with diarrhea 5 (21.73%). In the other hand, we noticed frequency of isolation was higher in male 14(60.86%) when compared with 9(39.14%) in female. Six strains of A. hydrophila have been observed to have bacteriocin activity against 12 of 23 different A. hydrophila ,as well as Staphy
... Show MoreAbstract:
The aim of the present research is to evaluate the child’s nutritional
method (2-5 years old) which is based on his resistance of the food highly rich
with nutritional elements and his acceptance of the food of a low nutritional
value in addition to his having forbidden food with other mates and making
use of all mates when having food, in establishing the sound social values and
affection since child hood. The required statistical equation have been used
by the researcher namely (Z test).
The sample of the present study consists of (26) children who were selected
intentionally and randomly from the kindergartens of Al-Bayaa region and the
college of Education for women. The questionnaires were d
The neutron, proton, and matter densities of the ground state of the proton-rich 23Al and 27P exotic nuclei were analyzed using the binary cluster model (BCM). Two density parameterizations were used in BCM calculations namely; Gaussian (GS) and harmonic oscillator (HO) parameterizations. According to the calculated results, it found that the BCM gives a good description of the nuclear structure for above proton-rich exotic nuclei. The elastic form factors of the unstable 23Al and 27P exotic nuclei and those of their stable isotopes 27Al and 31P are studied by the plane-wave Born approximation. The main difference between the elastic form factors of unstable nuclei and the
... Show MoreTwo‐dimensional buoyancy‐induced flow and heat transfer inside a square enclosure partially occupied by copper metallic foam subjected to a symmetric side cooling and constant heat flux bottom heating was tested numerically. Finite Element Method was employed to solve the governing partial differential equations of the flow field and the Local Thermal Equilibrium model was used for the energy equation. The system boundaries were defined as lower heated wall by constant heat flux, cooled lateral walls, and insulated top wall. The three parameters elected to conduct the study are heater length (7 ≤
The rapid spread of the COVID-19 coronavirus in 2019 infected many people, primarily affecting the respiratory system. Both COVID-19 and type 2 diabetes have been associated with numerous risks that have become life-threatening. The study studied the link between galectin levels and some clinical characteristics in Iraqis with type 2 diabetes and COVID-19 against those without diabetes. The study included 120 patients and healthy men. Three groups were formed for this study depending on the initial mutant cell line: 80 samples of individuals with type 2 diabetes, aged 40–60 years, with and without COVID-19, were included in each of the first and second groups. The control group consisted of 40 research participants who were matched for ag
... Show MoreThe aim of this research is to investigation the optimization of the machining parameters (spindle speed, feed rate, depth of cut, diameter of cutter and number of flutes of cutter) of surface roughness for free-form surface of composite material (Aluminum 6061 reinforced boron carbide) by using HSS uncoated flat end mill cutters which are rare use of the free-form surface. Side milling (profile) is the method used in this study by CNC vertical milling machine. The purpose of using ANFIS to obtain the better prediction of surface roughness values and decreased of the error prediction value and get optimum machining parameters by using Taguchi method for the best surface roughness at spindle speed 4500 r.p.m, 920mm/rev feed rate, 0.6mm de
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the