Two new nonsymmetrical mesogenic homologous series of terminal substituent ether (series [Vn]) and carboxy (series [VIn]) incorporating azobenzene and 1,3,4-oxadiazole group were synthesized. Both series have been All compounds thus isolated were purified and characterized by elemental analysis, Fourier Transform Infrared Spectroscopy, 1H NMR, along with thermal analysis and texture observation using Differential Scanning Calorimetry (DSC) and Polarizing Optical Microscopy (POM), respectively. All compounds of the first series exhibited liquid crystalline properties. The homologues [V1]-[V3] display a nematic mesophase, the compounds [V4]-[V7] exhibit a dimorphism behavior, nematic (N) and smectic A (SmA) mesophases, the compounds [V8] and [VI9] display enantiotropic smectic A and C (SmA and SmC) phases and the last homologue [V12] exhibits only a smectic C mesophase. All compounds of the second series [VIn] also show mesomorphic behavior, the compounds [VI1]-[VI3] and [VI5] display the nematic mesophase, the homologue [VI7] exhibits dimorphism behavior, nematic, and smectic A (SmA). The mesomorphic behavior has been analyzed in terms of structural property relationships.
In this article, Pb2Ba1.7Sr0.3Ca2Cu3O10+δ superconductor material was synthesized using conventional solid-state reaction method. X-ray diffraction (XRD) analysis demonstrated one dominant phase 2223 and some impurities in the product powder. The strongest peaks in the XRD pattern were successfully indexed assuming a pseudo-tetragonal cell with lattice constants of a = 3.732, b = 3.733 and c = 14.75 Å for a Pb-Based compound. The crystallite size and lattice strain between the layers of the studied compound were estimated using several methods, namely the Scherrer, Williamson-Hall (W.H), sizestrain plot (SSP) and Halder Wagner (H.W) approach. The values of crystallite size, calculated by Scherrer, W.H, SSP and H.W methods, were 89.454077
... Show MoreAugust Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive
... Show MoreThe study aimed to identify the effect of the ethical perception of a sample of managers in public organizations on responsible behavior in light of the rapid changes taking place in the external environment. To achieve this, the researcher followed the descriptive analytical approach by applying a questionnaire of two parts. The first part dealt with the ethical perception according to the scale of Johnson (2015), which consisted of (22) items. The second part dealt with measuring responsible behavior, which consisted of (20) items based on the scale of Development of Ethical Behavior (Narvaez, 2006) for a sample of (125) respondents randomly chosen. The results showed that the estimation degree of managers in public governmental o
... Show MoreGFRP was employed in constructions as an alternative to steel, which has many advantages like lightweight, large tensile strength and resist corrosion. Existing researches are insufficient in studying the influence of hybrid reinforced concrete composite columns encased by GFRP I-section (RCCCEG) and I-section steel (RCCCES). In this study twenty one (RC) specimens of a cross-section of 130 mm × 160 mm, with different length (long 1600 mm and short 750 mm) were encased by using I-section (steel and GFRP) and tested under various loading (concentric, eccentric and flexural loads). The test was focused on the influence of many parameters; load-carrying capacity, mode of failure, deformation and drawing an interaction diagram (N-
... Show MoreIn this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using
In this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using
Background: Women with previous two or
more caesarean deliveries are usually
managed by elective cesarean section to avoid
the possible risks of labor.
Objective: To compare the relative risks of
maternal and fetal outcomes in emergency
versus elective previous two or more
caesarean deliveries
Design: Randomized prospective clinical
study
Setting: Al-Elweya Maternity Teaching
Hospital, from 1st of March to 31st of
September 2008.
Methods: The study groups, those who had
previous two or more caesarean deliveries,
were included from the hospital admissions.
The 1st group (102 women) presented in labor
and was managed by caesarean delivery as
soon as it was possible. The second group (7
In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show More