In this study, an improved process was proposed for the synthesis of structure-controlled Cu2O nanoparticles, using a simplified wet chemical method at room temperature. A chemical solution route was established to synthesize Cu2O crystals with various sizes and morphologies. The structure, morphology, and optical properties of Cu2O nanoparticles were analyzed by X-ray diffraction, SEM (scanning electron microscope), and UV-Vis spectroscopy. By adjusting the aqueous mixture solutions of NaOH and NH2OH•HCl, the synthesis of Cu2O crystals with different morphology and size could be realized. Strangely, it was found that the change in the ratio of de-ionized water and NaOH aqueous solution led to the synthesis of Cu2O crystals of different sizes, while the morphology of Cu2O crystals was not affected. The synthesized Cu2O crystal samples were used as photocatalysts for methyl orange (MO) dye decomposition, as a model molecule, to evaluate the photocatalytic activities. However, under 200 watts of a visible light source, there are four samples with and without graphene-based nanocomposite of Cu2O NPs. The results showed that, compared with roughly spherical, irregular but thick plates, brick and small granule spheres shaped Cu2O nanoparticles provided better activity. The Cu2O sample with irregular but thick platelet-like shapes, having an average particle size of 0.53 µm, exhibited excellent photocatalytic activity (99.08% degradation). In addition, by reducing the size of Cu2O particles and preparing their graphene composition, one can fabricate a sample (Cu2-Cu2Gr) with the highest efficiency which has significantly better photocatalytic activity in comparison to the others. This work represents an innovative strategy for pre-the-case production of nanomaterials with shapes and sizes, that is, Cu2O crystals, with excellent photocatalytic activity through compositing with graphene
The current study seeks to evaluate teacher preparation programs in the scientific disciplines at the College of Education in Al-Aqsa University in the light of the requirements of the labor market. It further aims to reveal the significance of the differences in the sample members’ response averages of to the availability of labor market requirements in the program that prepares the teacher of scientific disciplines at the Faculty of Education in Al-Aqsa University taking into account the (gender, program) variables. The study followed the descriptive analytical approach, and so a questionnaire was distributed to a sample of scientific discipline students in the teacher preparation program adopted in Al-Aqsa University, (200) male and
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More
This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show MoreRA Ali, LK Abood, Int J Sci Res, 2017 - Cited by 2
Photodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction
The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show More