In this paper we present the first ever measured experimental electron momentum density of Cu2Sb at an intermediate resolution (0.6 a.u.) using 59.54 keV 241Am Compton spectrometer. The measurements are compared with the theoretical Compton profiles using density function theory (DFT) within a linear combination of an atomic orbitals (LCAO) method. In DFT calculation, Perdew-Burke-Ernzerhof (PBE) scheme is employed to treat correlation whereas exchange is included by following the Becke scheme. It is seen that various approximations within LCAO-DFT show relatively better agreement with the experimental Compton data. Ionic model calculations for a number of configurations (Cu+x/2)2(Sb-x) (0.0≤x≤2.0) are also performed utilizing free atom profiles, the ionic model suggests transfer of 2.0 electrons per Cu atom from 4s state to 5p state of Sb.
In this work, the effect of different particle size on the nonlinear optical properties of silver nanoparticles in de-ionized water was studied. The experimental observation of the far field diffraction patterns by CCD camera in two and three dimensions. The maximum change of nonlinear refractive index and the relative phase shift were calculated. The self-defocusing technique was used with a continuous-wave radiation from DPSS Blue laser .The wavelength is 473 nm with an output power of 270 mW. All the Ag colloids samples containing the sizes 15, 30, 50, and 70 nm of silver nanoparticles used in the study were chemically prepared. It was found that the nonlinear refractive index is a particle size dependent and of the order of 10-7 cm2/
... Show MoreInelastic magnetic electron scattering M1 at Ex =10.23 MeV form factors in Ca-48 have been investigated. The fp shell model space with four orbits and eight neutrons have been considered and FPD6 has been selected between 32 model space effective interactions to generates the model space vectors for the M1 transition with excitation energy Ex =10.23 MeV and for constructing OBDM. Discarded space (core and higher configuration orbits) has been included through the first order perturbation theory to couple the partice-hole pair of excitation in the calculation of the total M1 form factor and regarding the realistic interaction M3Y as a core polarization interaction with six sets of fitting parameters. Finally the theoretical calculations h
... Show MoreWith the premise that effective use of online instructional practices is of vital importance in classrooms, the current study aimed to examine the effects of using Moodle applications to develop instructors’ skills in designing electronic tests at Dhofar University. The sample of this study consisted of (25) instructors participated in the experimental group. The researchers implemented a quasi-experimental design with one group pre- and post-test; in addition, an observation card was implemented to measure the target skills related to test design. The research instruments were subjected to validity and reliability measures to ensure valid and reliable data and results. The study results showed that those instructors who participated i
... Show MoreSimulation of direct current (DC) discharge plasma using
COMSOL Multiphysics software were used to study the uniformity
of deposition on anode from DC discharge sputtering using ring and
disc cathodes, then applied it experimentally to make comparison
between film thickness distribution with simulation results. Both
simulation and experimental results shows that the deposition using
copper ring cathode is more uniformity than disc cathode
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More