This contribution investigates the impact of adding transition metal of Ti to CeOy samples at various concentrations referring to 0, 15.84, 24.46, 34.46, 36.23, 38.46, 45.38% and pure TiOy, correspondingly. The samples were fabricated by the magnetron sputtering technique. X-ray diffraction (XRD) configurations demonstrate the presence of α-Ce2O3 and Ce2O3 phases with increased Ti contents in the systems. X-ray photoelectron spectroscopy (XPS) experimentation confirms the purity of the S1-sample (CeO2) and the purity of the S8-sample (TiO2). Further XPS analysis reveals that Ti incorporation in the doped systems functions as a reducing agent because of the existence of α-Ce2O3 and Ce2O3 phases. Moreover, based on UV–vis spectroscopy results, the studied samples exhibit indirect optical energy band-gaps reduced from 2.6 to 2.35 eV with the increase of Ti concentrations of 0–45.38% in (S1-S7), respectively. In reference to bandgap 2.35 eV, a slight rise in band gaps was detected for S3 sample. However, an observable increase in the band gap of 2.9 eV occurred for S8 (pure TiO2). Optical analysis of the calculated energy loss parameters demonstrates that all the studied samples reveal small amounts of energy loss. Our results suggest that the improved optical properties of Ti-doped CeOy films could serve for various optical applications.
Throughout history, artists have played many important roles in society.
Generally speaking, the role of the artist is defined by the society he is part of.
Indeed, there are as many ideas as to the role of the artist and, ultimately the purpose
of art in society, as there are types of art. This is, as a matter of fact, neither a new
question- the dialogue has been present within art for centuries- nor probably one
that will ever fully be answered.
Tom Stoppard came to prominence in the mid-sixties, when art and politics
were closely linked, and theatre sought to change the world. Stoppard would have
none of that: his work has no overt message, no political program. In fact,
... Show MoreThe present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.
The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w
... Show Moreforty-six patients with asthma were tested for the scrum levels of total sialic and diffrental the results reveled a significant increased in the scra of asthmatic patients
Background: The SARS-CoV-2 virus causes COVID-19, a respiratory syndrome. It causes inflammation and damages several organs in the body. miRNAs play a role in regulating the infection resulting from SARS-CoV-2. MicroRNA-155, a kind of microRNA linked to viral defences, can affect the immune responses during COVID-19. Objectives: Examination of the involvement of microRNA-155 in the development and severity of COVID-19, as well as finding the correlation between microRNA-155 and viral load (copies/mL) in severe cases of the disease. Materials and Method: A case-control research study was performed between October 2022 and June 2023. It included a cohort of 120 hospitalised individuals with severe cases of COVID-19, together with 115 individu
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA three species food web model involving a stage structure and cannibalism in the top predator species is proposed and studied. It is assumed that the prey species growth logistically in the absence of predator and the predation process occurred according to theLotka-Volterra functional response. The existence, uniqueness and bounded-ness of the solution of the model are investigated. The local and global stability conditions of all possible equilibrium points are established.The persistence conditions of the model are also determined. The local bifurcation near each of the equilibrium points is analyzed. The global dynamics of the model is investigated numerically and compared with the obtained analytical results. It is observed that the p
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreHartree-Fock (HF) method relies in the calculations of nonlinear optical properties (NLO) for benzoic acid molecule. Also, another theoretical study is conducted by using the TD-DFT Density Functional Theory through B3LYP/High Base Set 6-311++G (2d,2p) on Gaussian program09. Moreover, an experimental study has been done to obtain the electrons spectrum for benzoic acid with and without ethanol. While the experimental study is done by using UV/VIS. spectrophotometer. Energy gap values of electronic transition between HOMO and LUMO is obtained from theoretical and experimental results. Consequently, the theoretical result for determining the energy gap calculated from EHOMO-LUMO wasvery close to the results of UV / VIS. spectrum. A theoretica
... Show More