CuO nanoparticles were synthesized in two different ways, firstly by precipitation method using copper acetate monohydrate Cu(CO2CH13)2·H2O, glacial acetic acid (CH3COOH) and sodium hydroxide(NaOH), and secondly by sol-gel method using copper chloride(CuCl2), sodium hydroxide (NaOH) and ethanol (C2H6O). Results of scanning electron microscopy (SEM) showed that different CuO nanostructures (spherical and Reef) can be formed using precipitation and sol- gel process, respectively, at which the particle size was found to be less than 2 µm. X-ray diffraction (XRD)manifested that the pure synthesized powder has no inclusions that may exist during preparations. XRD results showed the particles size of highest peak at 38.9°, was equal to (15.93nm). In addition, Fourier transform infrared spectroscopy (FT-IR) were used to describe the prepared CuO nanostructures absorption peak at 610 cm-1 which confirms that the synthesized product is a pure CuO and may be attributed to Cu2O infrared active mode.
Newspaper headlines are described as compressed and ambiguous pieces of discourse that represent the bodies of the articles. Their main function is to provide the readers with an informative message they would have no prior idea about. Ifantidou (2009) claims that the function of a headline is to get the readers’ attention rather than providing information because it does not have to represent the whole of the article it refers to. This paper aims at examining this hypothesis in relation to scientific news headlines reported by a number of news agencies. The paper follows Halliday (1967) information structure theory by applying it on ten selected headlines; each two headlines represent one scientific discovery reported by different new
... Show MoreThe electronic structure of zinc blend indium gallium phosphide In0.5Ga0.5P nanocrystals which have dimension (2-2.8 nm) is investigated using the density functional theory coupled with large unit cell (LUC) for the different size core (8 ,16,54,64) atoms respectively. The investigated properties include total energy, energy gap, conduction band, valence band, cohesive energy, ionicity and density of state etc. as a function of core size and lattice constant. Results show the shape effect of increasing the core size and lattice constant on these electronic properties
The Arabic pronouns received a lot of attention from the ancient Arab grammarians, so they explained their origins, the different forms of their structure, and the aspects of the Arabs’ use of them, and explained the aspects and reasons for these uses, with what they had of linguistic insight, which guided them to clarify the truth of these pronouns.
And recently, this research seeks new knowledge of the development of the structure of the nominative pronouns (he), (she), (them), (taa), and (waw) between dialects and towards classical Arabic, by analyzing the structure of these pronouns into their components. Its linguistic formulas are traced from the ancient Arabic texts, and by ancient I mean the texts of the era of linguistic ci
This paper presents stochastic analysis using the perturbation method to model the structure of a container to verify the distributions of probability of maximum and minimum axial forces reactions in piles. The proposed simulation of a container port terminal under 11 scenarios of load combinations was presented. The probability distributions for live loads are assigned according to the input parameters of simulation data. Part of the load itself is implicitly combined such as vertical live load which includes the weight of equipment and containers and wind load. The structural model was simulated in the software STAAD Pro., while the statistical analyses were performed with MATLAB. The results demonstrated that, the most significant extern
... Show MoreIn this paper Volterra Runge-Kutta methods which include: method of order two and four will be applied to general nonlinear Volterra integral equations of the second kind. Moreover we study the convergent of the algorithms of Volterra Runge-Kutta methods. Finally, programs for each method are written in MATLAB language and a comparison between the two types has been made depending on the least square errors.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThis study explores the challenges in Artificial Intelligence (AI) systems in generating image captions, a task that requires effective integration of computer vision and natural language processing techniques. A comparative analysis between traditional approaches such as retrieval- based methods and linguistic templates) and modern approaches based on deep learning such as encoder-decoder models, attention mechanisms, and transformers). Theoretical results show that modern models perform better for the accuracy and the ability to generate more complex descriptions, while traditional methods outperform speed and simplicity. The paper proposes a hybrid framework that combines the advantages of both approaches, where conventional methods prod
... Show More