In this study lattice parameters, band structure, and optical characteristics of pure and V-doped ZnO are examined by employing (USP) and (GGA) with the assistance of First-principles calculation (FPC) derived from (DFT). The measurements are performed in the supercell geometry that were optimized. GGA+U, the geometrical structures of all models, are utilized to compute the amount of energy after optimizing all parameters in the models. The volume of the doped system grows as the content of the dopant V is increased. Pure and V-doped ZnO are investigated for band structure and energy bandgaps using the Monkhorst–Pack scheme's k-point sampling techniques in the Brillouin zone (G-A-H-K-G-M-L-H). In the presence of high V content, the bandgap energy decreases from 3.331 to 2.043 eV as seen by the band diagram. PDOS diagram was utilized to get the insight of the electronic structure of the atoms and the amount to which all energy bands contribute to a particular orbit of the atoms. As the V content grew, so did the PDOS for all of the states. The manipulation of bandgaps was carried out in a way that narrowing the bandgaps occurs, resulting in a redshift of the absorption spectrum in the IR region. At lower photon energies, the imaginary and real parts dielectric functions have increased. The effectiveness of V atoms on transmissivity especially in the low energy region of the V-doped ZnO perovskite has been verified compared to the other theoretical results.
A significant increase in the incidence of non-O157 verotoxigenic Escherichia coli (VTEC) infections have become a serious health issues, and this situation is worsening due to the dissemination of plasmid mediated multidrug-resistant microorganisms worldwide. This study aims to investigate the presence of plasmid-mediated verotoxin gene in non-O157 E. coli. Standard microbiological techniques identified a total of 137 E. coli isolates. The plasmid was detected by Perfectprep Plasmid Mini preparation kit. These isolates were subjected to disk diffusion assay, and plasmid curing with ethidium bromide treatment. The plasmid containing isolates were subjected to a polymerase chain reaction (PCR) for investigating
... Show MoreOryza sativa japonica (ofada rice) is largely grown in Aramoko, Abakaliki and Ofada are communities and consumed by both the poor and rich in Nigeria. A total of twenty ofada rice farmlands were identified in each study area and rice samples were randomly collected, thoroughly mixed to make a representative sample from each farmland. Soil samples were collected in each farm to a depth of 5-15cm from at least eight different points and thoroughly mixed together to form a representative sample. The samples were thereafter taken to the laboratory for preparation and spectroscopic analysis. A well-calibrated NaI(Tl) gamma-ray detector was used in spectrometric analysis of the samples and descriptive statistics was used to analyze th
... Show MoreFullerene nanotube was synthesized in this research by pyrolysis of plastic waste Polypropylene (PP) at 1000 ° C for two hours in a closed reactor made from stainless steel using molybdenum oxide (MoO3) as a catalyst and nitrogen gas. The resultant carbon was purified and characterized by energy dispersive X-ray spectroscopy (EDX), X-ray powder diffraction (XRD). The surface characteristics of C60 nanotubes were observed with the Field emission scanning electron microscopy (FESEM). The carbon is evenly spread and has the highest concentration from SEM-EDX characterization. The result of XRD and FESEM shows that C60 nanotubes are present in Nano figures, synthesized at 1000 ° C and with pyrolysis tempera
... Show MoreActivity test of the inhibitors purified from barley and broad beans crop proved the inhibition activity against 6 types of rots Pencillium ssp and Aspergellusflavus and Aspergillus niger and Fusarium solani and Fusarium semitectum and Mucor with three concentrations 0.1 and 0.2 and 0.3 mg/ml, where the inhibitor purified from the second peak of broad beans proved that it had a higher inhibition activity against the growth of test rots which were 53.75 and 62.5 and 78.5 and 76.25 and 84 and 18.8% respectively, at 0.3 mg/ ml followed by the first peak of the inhibitor purified from broad beans the inhibition activity were 43.75 and 50 and 62.96 and 75 and 80 and 12.5 then the inhibitor purified from barley in which the inhibition activity
... Show MoreThe research involves using phenol – formaldehyde (Novolak) resin as matrix for making composite material, while glass fiber type (E) was used as reinforcing materials. The specimen of the composite material is reinforced with (60%) ratio of glass fiber.
The impregnation method is used in test sample preparation, using molding by pressure presses.
All samples were exposure to (Co60) gamma rays of an average energy (2.5)Mev. The total doses were (208, 312 and 728) KGy.
The mechanical tests (bending, bending strength, shear force, impact strength and surface indentation) were performed on un irradiated and irrad
... Show MoreThe inhibition of 3-Benzyl -2-mercaptoquinoizoline -4 (3H)-one (BMQ) on the corrosion of carbon steel in 0.5 M HCl studied by potentionstat polarization methods at 303–333 K. Results obtained show that BMQ act as inhibitor for carbon steel in HCl solution. The inhibition efficiency increase with increase in BMQ concentration. Activation parameters and Gibbs free energy for the adsorption process using Statistical Physics calculated and discussed. Quantum chemical calculations using DFT at the B3LYP/6-31G level of theory were used to calculate some electronic properties of the molecule to verify any correlation between the inhibitive effect and molecular structure of BMQ. The quantum calculations were proceeded to get data around correlati
... Show MoreAbsract
The letters of the Al-Safa Brothers contain many tales, in which each story is a literary text that is independent from the other texts, but it constitutes a unified entity in its entirety, because these stories contain recurring structural elements that go into building each one of them. The stories - the subject of the analysis - were not keen on something that was keen on adhering to the Sufi vision and its apparent effect on the tales of the messages, starting with the announcement of the narration to the narrator and his attempt to persuade the recipient of the truth of what is being told and its realism, and made him believe it. The stories correspond to the formal construction of the ideal style defined by th
... Show MoreCloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had
... Show MoreThis research involves studying the mechanical properties and corrosion behavior of “low carbon steel” (0.077wt% C) before and after welding using Arc, MIG and TIG welding. The mechanical properties include testing of microhardness, tensile strength, the results indicate that microhardness of TIG, MIG welding is more than arc welding, while tensile strength in arc welding more than TIG and MIG.
The corrosion behavior of low carbon weldments was performed by potentiostat at scan rate 3mV.sec-1 in 3.5% NaCl to show the polarization resistance and calculate the corrosion rate from data of linear polarization by “Tafel extrapolation method”. The results indicate that the TIG welding increase the corrosion current d
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More