The topological indices of the "[(µ3-2, 5-dioxyocyclohexylidene)-bis ((2-hydrido)-nonacarbonyltriruthenium]” were studied within the quantum theory of atoms in the molecule (QTAIM), clusters are
analyzed using the density functional theory (DFT). The estimated topological variables accord with prior
descriptions of comparable transition metal complexes. The Quantum Theory of Atom, in molecules
investigation of the bridging core component, Ru3H2, revealed critical binding points (chemical bonding)
between Ru (1) and Ru (2) and Ru (3). Consequently, delocalization index for this non-bonding interaction
was calculated in the core of Ru3H2, the interaction is of the (5centre–5electron) class.
Abstract This research investigates how activated carbon (AC) was synthesized from potato peel waste (PPW). Different ACs were synthesized under the atmosphere's conditions during carbonation via two activation methods: first, chemical activation, and second, carbon dioxide-physical activation. The influence of the drying period on the preparation of the precursor and the methods of activation were investigated. The specific surface area and pore volume of the activated carbon were estimated using the Brunauer–Emmett–Teller method. The AC produced using physical activation had a surface area as high as 1210 m2/g with a pore volume of 0.37 cm3/g, whereas the chemical activation had a surface area of 1210 m2/g with a pore volume of 0.34 c
... Show MoreThe present study deals with the experimental investigation of buried concrete pipes. Concrete pipes are buried in loose and dense conditions of gravelly sand soil and subjected to different surface loadings to study the effects of the backfill compaction on the pipe. The experimental investigation was accomplished using full-scale precast unreinforced concrete pipes with 300 mm internal diameter tested in a laboratory soil box test facility set up for this study. Two loading platforms are used namely, uniform loading platform and patch loading platform. The wheel load was simulated through patch loading platform which have dimensions of 254 mm *508 mm, which is used by AASHTO to model the wheel load of a HS20 truck. The pipe-soil system
... Show MoreA real method of predication brake pad wear ,could lead to substantiol economies of time and money. This paper describes how such a procedure has been used and gives the results to establish is reliability by comparing the predicted wear with that which actually occurs in an existing service. The experimental work was carried out on three different commercial samples ,tested under different operation conditions (speed,load,time...etc)using a test ring especially modified for this purpose. Abrasive wear is mainly studied , since it is the type of wear that takes place in such arrangements. Samples wear tested in presences of sand or mud between the mating surfaces under different operational conditions of speed, load and braking time .Mec
... Show MoreMilling Machining is a widely accepted nontraditional machining technique used to produce parts with complex shapes and configurations. The material is removed in two stages roughing and finishing, the flat end cutter removed the unwanted part of material, then finished by end mill cutter. In milling technique, the role of machining factors such as cutting depth, spindle speed and feed has been studied using Taguchi technique to find its effectiveness on surface roughness. Practical procedure is done by Taguchi Standard matrix. CNC milling is the most conventional process which is used for removing of material from workpiece to perform the needed shapes. The results and relations indicate that the rate of feed is v
... Show MoreThe objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreA new and hybrid deep learning-based approach for diagnosing faults in electric vehicle (EV) drive motors is proposed in this article. This article presents a new and hybrid deep learning-based method of diagnosing faults in the drive motors of electric vehicles (EV). In contrast to standard CNNLSTM approaches that depend on SoftMax classification, the introduced framework combines a Random Forest (RF) classifier to enhance the generalization, interpretability, and robustness of fault prediction. Furthermore meant for use on edge computing equipment with IoT integration, the design allows for real-time monitoring in resource-limited settings. The introduced algorithm utilizes a Random Forest (RF) classifier for accurate fault classification
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThis study is conducted to verify the efficienecy of local Ninivite rock when used in the treatment of drinking water in plants operating currently in the country in order to develop the situation of these stations to cope with the increase in population. Also, this will limit the pollutian which are increasing in the country's rivers.
(Euphrates and Tigris). These rivers are the sources to feed all water treatment plants in the country. The idea is the develop or the modify these stations by replacing part of top layer of sand filters used in these stations with Ninivite rock to operate as filters composed of two medium. The efficiency of this rock is compared with other materials used successfully worldwide in this area, such a
... Show More