The syntheses, characterizations and structures of three novel dichloro(bis{2-[1-(4-methoxyphenyl)-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})metal(II), [M(L)2Cl2], complexes (metal = Mn, Co and Ni) are presented. In the solid state the molecules are arranged in infinite hydrogen-bonded 3D supramolecular structures, further stabilized by weak intermolecular π…π interactions. The DFT results for all the different spin states and isomers of dichloro(bis{2-[1-phenyl-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})metal(II) complexes, [M(L1)2Cl2], support experimental measurements, namely that (i) d5 [Mn(L1)2Cl2] is high spin with S = 5/2; (ii) d7 [Co(L1)2Cl2] has a spin state of S = 3/2, (iii) d8 [Ni(L1)2Cl2] has a spin state of S = 1; and (iv) for all [M(L1)2Cl2] and [M(L)2Cl2] complexes, with M = Mn, Co and Ni, the cis-cis-trans and the trans-trans-trans isomers, with the pyridyl groups trans to each other, have the lowest energy.
An oxidative polymerization approach was used to create polyaniline (PANI) and Fe2O3 /PANI nanoparticle combination. Various characterization approaches were used to investigate the structural, morphological, and Fe2O3 /PANI nanoparticle structures. The findings support the synthesis of polycrystalline nanoparticle PANI and Fe2O3 /PANI spherical nanoparticle composites. Gram-positive bacteria are tested for antibacterial activity. Various quantities of Nanoparticles of PANI and Fe2O3 /PANI nanoparticle composites were used to test Staph-aureus and gram-negative bacteria, E-coli, and candida species. PANI has antibacterial properties against all microo
... Show MoreFoundations supporting reciprocating engines, radar towers, turbines, large electric motors, and generators, etc. are subject to vibrations caused by unbalanced machine forces as well as the static weight of the machine. If these vibrations are excessive, they may damage the machine or cause it not to function properly. In the case of block foundation, if changes in size and mass of the foundation do not lead to a satisfactory design, a pile foundation may be used. In this study, the dynamic response of piles and pile Groups in dry sand is investigated experimentally. The analysis involves the displacement response under harmonic excitation. In addition, a numerical modeling by using finite element method with a three-dimensional formula
... Show MoreA localized stenosis or aneurysm is a discontinuity that presents the pulse wave produced by the contracting heart with a reflection site. However, neither wave speed ( c) in these discontinuities nor the size of reflection in relation to the size of the discontinuity has been adequately studied before. Therefore, the aim of this work is to study the propagation of waves traversing flexible tubes in the presence of aneurysm and stenosis in vitro. We manufactured different sized four stenosis and four aneurysm silicone sections, connected one at a time to a flexible ‘mother’ tube, at the inlet of which a single semi-sinusoidal wave was generated. Pressure and velocity were measured simultaneously 25 cm downstream the inlet of th
... Show MoreIn this paper, isobutane (R-600a) is used as a suitable substitute for (R-134a) when changing the length of capillary tube. And the experimental data on capillary tube are obtained under different conditions such as (subcooling and ambient temperatures) on domestic refrigerator (9ft3 size), this data shows that (R-600a) a suitable substitute for (R134a) .The test presented a model for a steady state, two-phase flow in capillary tube for vapour compression system .The numerical model depends on conservation equations (mass, energy and momentum) as wall as the equation of state for refrigerant. The solution methodology was implemented by using finite difference techniques. The system results indicate that it is possible to change the refri
... Show MoreThis work introduces a new electrode geometry for making holes with high aspect ratios on AISI 304 using an electrical discharge drilling (EDD) process. In addition to commercially available cylindrical hollow electrodes, an elliptical electrode geometry has been designed, manufactured, and implemented. The principal aim was to improve the removal of debris formed during the erosion process that adversely affects the aspect ratio, dimensional accuracy, and surface integrity. The results were compared and discussed to evaluate the effectiveness of electrode geometry on the machining performance of EDD process with respect to the material removal rate (MRR,) the electrode wear rate (EWR), and the tool wear ratio (TWR). Dimensional features an
... Show MorePoly (3-hydroxybutyrate) (PHB) is a typical microbial bio-polyester reserve material; known as “green plastics”, which produced under controlled conditions as intracellular products of the secondary metabolism of diverse gram-negative/positive bacteria and various extremophiles archaea. Although PHB has properties allowing being very attractive, it is too expensive to compete with conventional and non-biodegradable plastics. Feasibility of this research to evaluate the suitability of using a watermelon-derived media as an alternative substrate for PHB synthesis under stress conditions was examined. Results, include the most nutrients extraction, indicated that the watermelon seeds contain a high content of nutrients makes them a promisi
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More