Preferred Language
Articles
/
bsj-7945
A Theoretical Investigation of Chemical Bonding of a Heterometallic Trinuclear Cluster Containing Iridium and Ruthenium: [(Cp*Ir) (CpRu)2 (μ3-H) (μ-H)3] by QTAIM Approach
...Show More Authors

  Numerous integral and local electron density’s topological parameters of significant metal-metal and metal-ligand bonding interactions in a trinuclear tetrahydrido cluster [(Cp* Ir) (Cp Ru)23-H) (μ-H)3]1 (Cp = η5 -C5Me5), (Cp* = η5 -C5Me4Et) were calculated and interpreted by using the quantum theory of atoms in molecules (QTAIM). The properties of bond critical points such as the delocalization indices δ (A, B), the electron density ρ(r), the local kinetic energy density G(r), the Laplacian of the electron density 2ρ(r), the local energy density H(r), the local potential energy density V(r) and ellipticity ε(r) are compared with data from earlier organometallic system studies. A comparison of the topological processes of different atom-atom interactions has become possible thanks to these results. In the core of the heterometallic tetrahydrido cluster, the Ru2IrH4 part, the calculations showed that there are no bond critical points (BCPs) or identical bond paths (BPs) between Ru-Ru and Ru-Ir. The distribution of electron densities is determined by the position of bridging hydride atoms coordinated to Ru-Ru and Ru-Ir, which significantly affects the bonds between these transition metal atoms. On the other hand, the results confirm that the cluster under study contains a 7c–11e bonding interaction delocalized over M3H4, as shown by the non-negligible delocalization index calculations. The small values for ρ(b) above zero, together with the small values, again above zero, for Laplacian 2ρ(b) and the small positive values for total energy density H(b), are shown by the Ru-H and Ir-H bonds in this cluster is typical for open-shell interactions. Also, the topological data for the bond interactions between Ir and Ru metal atoms with the C atoms of the cyclopentadienyl Cp ring ligands are similar. They show properties very identical to open-shell interactions in the QTAIM classification.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 02 2018
Journal Name
Journal Of The College Of Education For Women
The Famous Muslims' Graveyards in the Persian Country in the Islamic Ages: A Historical Study in the Maraqid Al-Maaraf Book for Harz Aldeen
...Show More Authors

There are many studies that discussed the famous museum's graveyards in the Islamic worlds, to study the lives of these figures, there are many difficulties for their studies because the first we need the regularity and history information, and many sciences support, such as in language, geography information.

I am studying the research from Maraqid Al-Maaraf book by Harz Aldeen, the book has large members about the persons have graved in Persian Country in the middle ages, there are more than (30) figures in my study, I have studied every figure in this research depending on the sources and references books.

View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Surface And Coatings Technology
Effect of new zirconia surface coatings on the surface properties and bonding strength of veneering zirconia substrate
...Show More Authors

View Publication
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The eloquence of the poetic image in the poetry of the Andalusian son of Labanism is a stylistic approach
...Show More Authors

The resort to the eloquence of the poetic image as a style reveals the poet's creativity and creativity in dealing with external influences, and reflect them with emotional images express a sense of intense emotional imagination, and this imagination stems from the experience of a poetic sense of truth, tasted by the recipient before the creator of the poetic text.

View Publication Preview PDF
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of The College Of Languages (jcl)
L’alternance codique ou le code switching dans l’échange verbal
...Show More Authors

Le mot anglais code switching ou l’équivalent français alternance codique est un terme très utilisé dans des recherches qui traitent des problèmes en sociolinguistique. Le bilingue dispose, dans son répertoire linguistique, de moyens de communication qui lui permettent d’adapter son langage à des situations de communication plus variées que ceux du monolingue. Le code-switching ou l’alternance codique qui est un lieu de structuration de stratégies de communication en est un moyen indispensable.
L’alternance codique dans la conversation est l’utilisation d’un mot ou plus appartenant à une langue B à l’intérieur d’une phrase qui appartient à une langue A. Dans la plupart des cas, le locuteur se sert de l’a

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Heating and Melting Model Induced by Laser Beam in Solid Material
...Show More Authors

An analytical method and a two-dimensional finite element model for treating the problem of laser heating and melting has been applied to aluminum 2519T87and stainless steel 304. The time needed to melt and vaporize and the effects of laser power density on the melt depth for two metals are also obtained. In addition, the depth profile and time evolution of the temperature before melting and after melting are given, in which a discontinuity in the temperature gradient is obviously observed due to the latent heat of fusion and the increment in thermal conductivity in solid phase. The analytical results that induced by  laser irradiation is in good agreement with numerical results.

View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Nonparametric statistical study for the crime motives on a sample of inmates in Khartoum State prisons
...Show More Authors

The aim of the research was to investigate the use of non-parametric tests in the analysis of the questionnaire and how to choose the appropriate test for testing the hypothesis of the study of crime motives in Khartoum State. The data were collected through the primary sources by designing a questionnaire and distributed to a sample of inmates in Khartoum state; the data were analysis by SPSS program using the analytical statistical method through using some of the suitable non-parametric tests for each case. The most important results of the research were: there was significant relationship between the type of crime and the age group therefore, we found that the age group (20-29) was the most frequent crime particularly, the fi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Al-rafidain Dental Journal
The Effect of Two Bonding Agents Generations On Microleakage Of Composite Resin Using Two Light Curing Systems.
...Show More Authors

Aim: To evaluate the effect of two bonding systems and two curing systems on sealing ability of class V composite restorative materials. Materials and methods: This study was performed in vitro on 40 caries free upper first premolar teeth. The Standardized class V cavity preparation on buccal and lin- gual surfaces of each tooth was done. Then the teeth were randomly divided into two major groups each of twenty. 40 cavities were performed on these teeth and the first group7th generation bonding agent (i Bond) were applied according to the manufacturer instructions and single increment of univer- sal composite (XRV Herculite) from kerr were applied and twenty of the cavities were cured with con- ventional light cure device (astralis-5) and t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Results In Physics
Alpha-cluster preformation probability in even-even actinide nuclei
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Advanced Research In Dynamical And Control Systems
The impact of node density over routing protocols in manet by using NS-3
...Show More Authors

Scopus (5)
Scopus