The chemical bath deposition technique (CBD) is considered the cheapest and easiest compared with other deposition techniques. However, it is highly sensitive to effective parameter deposition values such as pH, temperature, and so on. The pH value of the reaction solution has a direct impact on both the nucleation and growth rate of the film. Consequently, this study presents a novel investigation into the effect of a precise change. in the pH reaction solution value on the structural, morphological, and photoresponse characteristics of tin monosulphide (SnS) films. The films were grown on a flexible polyester substrate with pH values of 7.1, 7.4, and 7.7. The X-ray diffraction patterns of the grown films at pH 7.1 and 7.4 confirmed their polycrystalline nature. Additionally, an observed alteration in the crystal structure occurred as the pH value increased from 7.1 to 7.4, resulting in a transition from an orthorhombic crystal structure to a cubic crystal structure. In contrast, the XRD pattern of the grown film at pH 7.7 revealed that it was amorphous. The field-emission scanning electron microscopy images revealed a flower-like morphology for the grown film at 7.1, whereas the grown films at 7.4 and 7.7 revealed a grain morphology. The results also showed that the pH values were also having an important effect on the energy gap value (Eg ) of films; the Eg values were 1.46, 1.57, and 1.65 eV for pH 7.1, 7.4, and 7.7, respectively. The photodetectors fabricated using grown films exhibited excellent photoresponse characteristics. when subjected to near-infrared (750 nm) illumination. It was also demonstrated that the photodetector using. the cubic structure film possessed faster response times and greater sensitivity than the photodetector using the orthorhombic structure film.
Background: Immediate implant placement in the maxillary anterior region was challenging, especially with the jumping gap and limited primary implant stability. Objective: To assess the autogenous dentin graft biomaterial's ability to improve the esthetic outcomes of an immediately inserted implant. Methods: Twenty patients with non-restorable retained roots in the maxillary non-molar region surrounded by natural sound teeth were included in this study after a complete clinical and radiological examination, including patient health and clinical fitness for the immediate dental implant procedure. A single dental implant was inserted for each patient, and the resulting jump distance was filled with the mineralized dentin graft and co
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
A Multiple System Biometric System Based on ECG Data
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.