Thin filis have been prepared from the tin disulphide (SnS2 ), the pure and the doped with copper (SnS2:Cu) with a percentages (1,2,3,4)% by using ahemical spray pyrolysis techniqee on substrate of glass heated up to(603K)and sith thicknesses (0.7±0.02)?m ,after that the films were treated thermally with a low pressure (10-3mb) and at a temperature of (473K) for one hour. The influence of both doping with copper and the thermal treatment on some of the physical characteristics of the prepared films(structural and optical) was studied. The X-ray analysis showed that the prepared films were polycrystalline Hexagonal type. The optical study that included the absorptance and transmitance spectra in the weavelength range (300-900)nm
... Show MoreIn recent years, observed focus greatly on gold nanoparticles synthesis due to its unique properties and tremendous applicability. In most of these researches, the citrate reduction method has been adopted. The aim of this study was to prepare and optimize monodisperse ultrafine particles by addition of reducing agent to gold salt, as a result of seed mediated growth mechanism. In this research, gold nanoparticles suspension (G) was prepared by traditional standard Turkevich method and optimized by studying different variables such as reactants concentrations, preparation temperature and stirring rate on controlling size and uniformity of nanoparticles through preparing twenty formulas (G1-G20). Subsequently, the selected formula that pr
... Show MoreAbstract The concept of quantum transition is based on the completion of a succession of time dependent (TD) perturbation theories in Quantum mechanics (QM). The kinetics of "quantum" transition, which are dictated by the coupled motions of a lightweight electrons and very massive nuclei, are inherent by nature in chemical and molecular physics, and the sequence of TD perturbation theory become unique. The first way involved adding an additional assumption into molecule quantum theory in the shape of the Franck-Condon rule, which use the isothermal approach. The author developed the second strategy, which involved injecting chaos to dampen the unique dynamically of the bonding movement of electrons and nuclei in the intermediary state of
... Show MoreThe adsorption of hexavalent chromium by preparing activated carbon from date seeds with zinc chloride as chemical activator and granular date seeds was studied in a batch system. The characteristics of date seeds and prepared activated carbon (ZAC) were determined and found to have a surface area 500.01 m2/g and 1050.01 m2/g , respectively and iodine number of 485.78 mg/g and 1012.91 mg/g, respectively. The effects of PH value (2-12), initial sorbate concentration(50-450mg/L), adsorbent weight (0.004-0.036g) and contact time (30-150 min) on the adsorption process were studied . For Cr(VI) adsorption on ZAC, at 120 min time contact, pH solution 2 and 0.02 adsorbent weight will ach
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreRecent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show More