Density Functional Theory (DFT) method of the type (B3LYP) and a Gaussian basis set (6-311G) were applied for calculating the vibration frequencies and absorption intensities for normal coordinates (3N-6) at the equilibrium geometry of the Di and Tetra-rings layer (6, 0) zigzag single wall carbon nanotubes (SWCNTs) by using Gaussian-09 program. Both were found to have the same symmetry of D6d point group with C--C bond alternation in all tube rings (for axial bonds, which are the vertical C--Ca bonds in rings layer and for circumferential bonds C—Cc in the outer and mid rings bonds). Assignments of the modes of vibration IR active and inactive vibration frequencies (symmetric and asymmetric modes) based on the image modes applied by the Gaussian 09 display. The whole relations for the vibration modes were also done including nCH stretching, nC--C stretching, δCH, δring (δC--C--C) deformation in plane of the molecule) and gCH, gring (gC--C--C) deformation out of plane of the molecule. The assignment also included modes of puckering, breathing and clock-anticlockwise bending vibrations.
الأثر V بالنسبة إلى sinshT و خواصه قد تم دراسته في هذا البحث حيث تم دراسة علاقة الأثر المخلص والاثر المنتهى التولد والاثر المنفصل وربطها بالمؤثرات المتباينة حيث تم بهنة العلاقات التالية ان الاثر اذا وفقط اذا مقاس في حالة كون المؤثر هو عديم القوة وكذلك في حالة كون المؤثر شامل فان الاثر هو منتهي التولد اي ان الغضاء هو منتهي التولد وايضا تم برهن ان الاثر مخلص لكل مؤثر مقيد وك\لك قد تم التحقق من انه لاي مؤثر مقي
... Show MoreThis study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that functions as an act over S if and only if functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following, is acting over S if and only if is a module where T is a nilpotent operator, is a
... Show MoreThis article aims to estimate the partially linear model by using two methods, which are the Wavelet and Kernel Smoothers. Simulation experiments are used to study the small sample behavior depending on different functions, sample sizes, and variances. Results explained that the wavelet smoother is the best depending on the mean average squares error criterion for all cases that used.
This study analyzes how to make use of the resources in the marshlands of Iraq and how to utilize them, especially after the water returns to these areas and they are revitalized. We take an example of AL- Saheen Marsh and plan an ideal tourist resort there. This example can further expand to include other parts of the marshlands. The resort will utilize the local environment and tourist characteristics as it will have a feel and architectural resemblance to the houses and buildings that are currently built there. In addition the transportation methods will be the same as those used by the locals. Yet the resort will still posses all the facilities required by a modern tourist resort that includes all the services that will make
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreA characteristic study of a passively Q-switched diode pumped solid state laser system is presented in this work. For laser a comparison study for the theoretically calculated results with a simulation results using a software which calculates the Q-switched solid state laser parameters was such as energy, peak power and pulse width were performed. There was a good agreement between our theoretical calculations and the simulation values.
Transparent nano- coating was prepared by Sol-Gel method from titanium dioxide TiO2 which has the ability to self-cleaning coating used for hospitals, laboratories, and places requiring permanent sterilization. Three primary colors are selected (red, blue, and yellow) as preliminary study to the effect of these colors on the nano-coating. Three traditional oil paints color were used as base, then coated by a layer of TiO2-Sol and deposited on the paints. The optical properties of TiO2-Sol were measured; the maximum absorption wavelength at (λmax=387 nm), the refractive index (n=1.4423) and the energy band gap (Eg=3.2 eV). The structure properties found by X-ray diffraction of TiO
The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.