Quantum dots (QDs) can be defined as nanoparticles (NPs) in which the movement of charge carriers is restricted in all directions. CdTe QDs are one of the most important semiconducting crystals among other various types where it has a direct energy gap of about 1.53 eV. The aim of this study is to exaine the optical and structural properties of the 3MPA capped CdTe QDs. The preparation method was based on the work of Ncapayi et al. for preparing 3MPA CdTe QDs, and hen, the same way was treated as by Ahmed et al. via hydrothermal method by using an autoclave at the same temperature but at a different reaction time. The direct optical energy gap of CdTe QDs is between 2.29 eV and 2.50 eV. The FTIR results confirmed the covalent bonding between the 3 MPA ligands and the QDs surface. The XRD results revealed that the synthesized QDs have two crystal structures, wurtzite and cubic zinc blend. FESEM results confirmed that the NPs have a spherical shape with an average diameter of nearly 33.85 nm. TEM analysis confirmed the particle's near sphericity, with an average diameter of around 49.33 nm. The sudden increase in temperature led to increase the particle size. It was found that ligand addition, maintaining the solution's acidity, and autoclaving the material enhanced quantum confinement.
In this work, we have investigated optical properties of the thermally evaporation PbS/CdS thin films. The optical constant such as (refractive index n, dielectric constant εi,r and Extinction coefficient κ) of the deposition films were obtained from the analysis of the experimental recorded transmittance spectral data. The optical band gap of PbS/CdS films is calculate from (αhυ)1/2 vs. photon energy curve.
This research deals with unusual approach for analyzing the Simple Linear Regression via Linear Programming by Two - phase method, which is known in Operations Research: “O.R.”. The estimation here is found by solving optimization problem when adding artificial variables: Ri. Another method to analyze the Simple Linear Regression is introduced in this research, where the conditional Median of (y) was taken under consideration by minimizing the Sum of Absolute Residuals instead of finding the conditional Mean of (y) which depends on minimizing the Sum of Squared Residuals, that is called: “Median Regression”. Also, an Iterative Reweighted Least Squared based on the Absolute Residuals as weights is performed here as another method to
... Show MoreIn this study, mean free path and positron elastic-inelastic scattering are modeled for the elements hydrogen (H), carbon (C), nitrogen (N), oxygen (O), phosphorus (P), sulfur (S), chlorine (Cl), potassium (K) and iodine (I). Despite the enormous amounts of data required, the Monte Carlo (MC) method was applied, allowing for a very accurate simulation of positron interaction collisions in live cells. Here, the MC simulation of the interaction of positrons was reported with breast, liver, and thyroid at normal incidence angles, with energies ranging from 45 eV to 0.2 MeV. The model provides a straightforward analytic formula for the random sampling of positron scattering. ICRU44 was used to compile the elemental composition data. In this
... Show MoreUsing photo electrochemical etching technique (PEC), porous silicon (PS) layers were produced on n-type silicon (Si) wafers to generate porous silicon for n-type with an orientation of (111) The results of etching time were investigated at: (5,10,15 min). X-ray diffraction experiments revealed differences between the surface of the sample sheet and the synthesized porous silicon. The largest crystal size is (30 nm) and the lowest crystal size is (28.6 nm) The analysis of Atomic Force Microscopy (AFM) and Field Emission Scanning Electron Microscope (FESEM) were used to research the morphology of porous silicon layer. As etching time increased, AFM findings showed that root mean square (RMS) of roughness and po
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
This research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai
... Show MoreThe present researchers are trying to enhance the properties of paper sheet that used widely in many fields such as printing and packaging. The enhancement of paper quality is also possible to preserve paper documents of all kinds, as they are the true record, full of the history, achievements of the human being and the intellectual and cultural of the country. It is possible to improve its physical and mechanical properties and preserve them from damage through the use of some solutions of polymeric adhesives, which act as protective barriers against water and moisture penetration. The paper also has the advantage of porosity, which has been overcome by using three types of polymeric adhesives (Nitro Cellulose, Polyvinyl alcohol acetate, a
... Show MoreImproving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application