Numerous integral and local electron density’s topological parameters of significant metal-metal and metal-ligand bonding interactions in a trinuclear tetrahydrido cluster [(Cp* Ir) (Cp Ru)2 (μ3-H) (μ-H)3]1 (Cp = η5 -C5Me5), (Cp* = η5 -C5Me4Et) were calculated and interpreted by using the quantum theory of atoms in molecules (QTAIM). The properties of bond critical points such as the delocalization indices δ (A, B), the electron density ρ(r), the local kinetic energy density G(r), the Laplacian of the electron density ∇2ρ(r), the local energy density H(r), the local potential energy density V(r) and ellipticity ε(r) are compared with data from earlier organometallic system studies. A comparison of the topological processes of different atom-atom interactions has become possible thanks to these results. In the core of the heterometallic tetrahydrido cluster, the Ru2IrH4 part, the calculations showed that there are no bond critical points (BCPs) or identical bond paths (BPs) between Ru-Ru and Ru-Ir. The distribution of electron densities is determined by the position of bridging hydride atoms coordinated to Ru-Ru and Ru-Ir, which significantly affects the bonds between these transition metal atoms. On the other hand, the results confirm that the cluster under study contains a 7c–11e bonding interaction delocalized over M3H4, as shown by the non-negligible delocalization index calculations. The small values for ρ(b) above zero, together with the small values, again above zero, for Laplacian ∇2ρ(b) and the small positive values for total energy density H(b), are shown by the Ru-H and Ir-H bonds in this cluster is typical for open-shell interactions. Also, the topological data for the bond interactions between Ir and Ru metal atoms with the C atoms of the cyclopentadienyl Cp ring ligands are similar. They show properties very identical to open-shell interactions in the QTAIM classification.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreIn this study, we design narrow band pass filter for window (3_5) ?m dependent on the needle optimization method , and a comparison with global designs published -Also, the effect of change parameter design on the optical performance of filter was studded and being able to overcome the difficulties of the design.In this study, the adoption of homogeneous optical properties materials as thin film depositing on a substrate of germanium at wavelength design (? = 4 ?m). For design this kind of filters we used advanced computer program (Matlab )to build a model design dependent both matrix characteristic and Needle technique. In this paper we refer to the type of Mert function , which is used for correct optical performance acces
... Show Morestructural and electrical of CuIn (Sex Te1-x)2
Background: Periodontitis and type 2 diabetes mellitus are both considered as a chronic disease that affect many people and have an interrelationship in their pathogenesis. Objective: The aim is to evaluate the salivary levels of interleukin-17 (IL-17) and galectin-3 in patients with periodontitis and type-2 diabetes mellitus. Materials and Methods: The samples were gathered from 13 healthy (control group) and 75 patients split into 3 groups, 25 patients with type 2 diabetes mellitus and healthy periodontium (T2DM group), 25 patients with generalized periodontitis (P group), and 25 patients with generalized periodontitis and type 2 diabetes mellitus (P-T2DM group). Clinical periodontal parameters were documented. The concentration of IL-17
... Show MoreThis research is drawn from a doctoral dissertation, studying the approach of Sheikh Abd al-Qadir al-Muhajir al-Sanandji al-Kurdi (1303 AH) on the issue of proving the existence of God Almighty.
Sheikh Abd al-Qadir al-Sanandji was one of the scholars well versed in mental sciences. He has many books, all of them in the sciences of speech and wisdom, and among his books is the book (Raising the Eyebrow in Explanation of Ithbat al-Wajib), which is still a manuscript that has not been printed.
Through this book, the researcher studied the evidence of Sheikh Abdul Qadir to prove the existence of God Almighty, and compared it with the evidence of philosophers and theologians.
At the beginning, he presented a study on the import
A method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.
Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreConflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s
... Show More