Novel Approach for Fabricating Transparent and Conducting SWCNTs/ITO Thin Films for Optoelectronic Applications
...Show More Authors
In this research PbS and PbS:Cu films were prepered with thicknesses (0.85±0.05)?m and (0.55±0.5)?m deposit on glass and silicon substrate respectively using chemical spray pyrolysis technique with a substrate temperature 573K, from lead nitrate salt, thiourea and copper chloride. Using XRD we study the structure properties for the undoped and doped films with copper .The analysis reveals that the structure of films were cubic polycrystalline FCC with a preferred orientation along (200) plane for the undoped films and 1% doping with copper but the orientation of (111) plane is preferred with 5% doping with the rest new peaks of films and appeared because of doping. Surface topography using optical microscope were be checked, it was found
... Show MoreThe main focus of research is on the nature of applications in the fields of science and technology, particularly nanotechnology. In this paper, a simple, non-toxic, inexpensive, and environmentally friendly green method was used to synthesize TiO2 nanoparticles using the extraction of portulacaria afra plant leaves and TiCl4 as a precursor. The synthesized titanium dioxide nanoparticles were characterized by scanning electron microscopy, atomic force microscopy, X-ray diffraction patterns, Fourier transform infrared spectroscopy, and Brunauer-Emmett-Teller analysis. The SEM image of TiO2 nanoparticles showed a few spherical, non-agglomerated particles. The average diameter of the nanoparticles, ac
... Show MoreThis study is included the preparation of two tetradentate amide-thiol proligands of the general structure [H2Ln], [where; (n = (1–2)]. The ligands [H2L1] and [H2L2] have been prepared from the reaction of the cyclic thioester 2-oxo-1, 4-dithiacyclohexane (compound 1) and 3-chloro-2-oxo-1, 4 dithiacyclohexane (compound 2) with 2-aminomethanepyridine in (1:1) ratio respetively. The reaction was carried out in chloroform at room temperature and under N2 atmosphere. Structural formula of these two ligands have been reported.
Praise be to God, Lord of the worlds, and prayers and peace be upon our master and beloved Muhammad, the wise guide and great teacher, the guide to a straight path, the one sent as a mercy to the worlds, and upon his good and chosen family, his chosen companions, the working scholars, and those who follow them in righteousness until the Day of Judgment.
And after:
One of the important controversial topics shared between the sciences of the Noble Hadith and the Fundamentals of God is the issue of the innovator in terms of accepting and rejecting his narration and testimony, and the difference in it leads to disagreement in many branches of jurisprudence that were based on texts narrated by innovated narrators or those accu
... Show More
Solar energy has significant advantages compared to conventional sources such as coal and natural gas, including no emissions, no need for fuel, and the potential for installation in a wide range of locations with access to sunlight. In this investigation, heterocyclic derivatives were synthesized from several porphyrin derivatives (4,4',4",4"'-(porphyrin-5,10,15,20-tetrayl) tetra benzoic acid) compound (3), obtained by reaction Pyrrole with 4-formyl benzoic acid. Subsequently, porphyrin derivative-component amides 5a, 5b, and 5c were produced by reacting compound (3) with amine derivatives at a 1:4 molar ratio. These derivatives exhibited varying sensitivities for utilization in solar cells, with compound 5a displaying the highest power
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe compounds 3-[4̄-(4˭-methoxybenzoyloxy) benzylideneamino]-2-thioxo-imidazolidine-4-one(3)aand 4-(1-(5-oxo- 2-thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(3)b were prepared from the reaction of aromatic aldehyde or ketone(1)a,bwith thiosemicarbazide to give aryl thiosemicarbazones(2)a,b ,followed by cyclization with ethylchloroacetate in the presence of fused sodium acetate. Treatment the compounds(3)a,bwith 4- hydroxybenzenediazoniumchloride yielded the correspondings4-((4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)methyl)phenyl 4-methoxybenzoate(4)aand4-(1-(4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(4)b.The new 2-thioxo-imidazolidin-4-one with esters (5-7)a,b sy
... Show More