Vanadium dioxide nanofilms are one of the most essential materials in electronic applications like smart windows. Therefore, studying and understanding the optical properties of such films is crucial to modify the parameters that control these properties. To this end, this work focuses on investigating the opacity as a function of the energy directed at the nanofilms with different thicknesses (1–100) nm. Effective mediator theories (EMTs), which are considered as the application of Bruggeman’s formalism and the Looyenga mixing rule, have been used to estimate the dielectric constant of VO2 nanofilms. The results show different opacity behaviors at different wavelength ranges (ultraviolet, visible, and infrared). The results depict that the highest opacity of the insulating phase is achieved at the ultraviolet region and it reduces for the metal phase. Besides, the results demonstrate that the opacity possesses a redshift during the changes at the three phases. Regarding the infrared region, the lowest opacity value is achieved at the insulator phase and it increases to the highest value at the metal phase. In the visible region, the opacity behavior remains similar in the three phases. It is worth noting that the lowest opacity is found for thinner nanofilm. Since both the refractive index and the extinction index are among the most essential optical constants, hence, both of them were compared with the experiment results, and an excellent agreement is achieved between them.
In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreMany pharmaceutical molecules have solubility problems that until yet consist a hurdle that restricts their use in the pharmaceutical preparations. Lacidipine (LCDP) is a calcium-channel blocker with low aqueous solubility and bioavailability.
Lipid dosage forms are attractive delivery systems for such hydrophobic drug molecules. Nanoemulsion (NE) is one of the popular methods that has been used to solve the solubility problems of many drugs. LCDP was formulated as a NE utilizing triacetin as an oil phase, tween 80 and tween 60 as a surfactant and ethanol as a co-surfactant. Nine formulas were prepared, and different tests performed to ensure the stability of the NEs, such as thermodyna
... Show MoreDrought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreElection study included four sites for the waters in area of Youssifiyah south of Baghdad (river water, tank water, liquefactions water, and water filtrate and seethed and purifier by alum and chloride), the samples were collected during the month of June in 2007. Temperature, electrical conductivity and acidity are measured. Also , the concentration of chloride , sulphate , carbonate , nitrate , sodium , calcium , magnesium , hard total and total dissolved substances are determined , as well as heavy metals assess environmental risk (such as Cu, Pb, Zn, Fe). It was also a study of bacterial totals included both total Bacteria (TB) and Total Coliform Bacteria (TC) and Fecal Coliform (FC) and Fecal Streptococci (FS). The stu
... Show MorePolycyclicacetal was prepared from the reaction of PEG with aldehyde derived from Erythro-ascorbic acid (pentulosono-ɣ-lactone-2,3-enedianisoate).All these compounds were characterized by Thin Layer Chromatography (TLC) and FTIR spectra and aldehyde was also characterized by (U.V-Vis), 1HNMR, 13CNMR, and mass spectra.The inhibitory effect of prepared polymer on the activity of human serum AcetylCholinesterase has been studied in vitro. The polymer showed a remarkable activity at low concentration (4.7x10-3 – 4.7x10-8M).
Background: The styloid process is a cylindrical bone (protrusion). It situated above the common carotid artery between the external and internal branches immediately proximal to the internal jugular vein and facial nerves. The styloid process varies in length also it may be absent as well as elongated. Classically, an elongated styloid process and calcified of stylohyoid ligament causes Eagle’s syndrome. The aim of this study was to examine the styloid process using 3 dimensional multi-detector computed tomography (3D-MDCT) to detect the presence of Eagle’s syndrome that causes severe headache and migraine. Materials and methods: One hundred patients with severe headache and migraine were exposed to 3D- multi-detector CT with special
... Show MoreMixed ligand of Co and Ni (II) complexes were prepared from [5-(p-nitrophenyl)-4/-phenyl-1,2,4-triazole-3-dithiocarbamato hydrazide](TRZ.DTC) as primary ligand and 2,2'-bipyridyl (bipy) as a co-ligand with metal salts. These complexes were analytically and spectroscopically characterized in solid state by elemental analyses, flame atomic absorption, magnetic susceptibility and molar conductance measurements, as well as by UV–Vis and FTIR spectroscopy. Infrared, ultra violet spectra reveal a bidentate coordination of the two ligands with metal ions 1:1:1 mole ratio. Room temperature magnetic moments and solid reflectance spectra data indicate paramagnetic complexes with five-coordinate square pyramidal geometry for nickel (II) comple
... Show More