Electrochemical method was used to prepare carbon quantum dots (CQDs). Size of matter was nature when evaluate via X-ray diffraction (XRD). A distinct peak at 2θ equal to 31.6° and three other small peaks at 38.28°, 56.41° and 66.12° were observed. The measures of Fourier Transform Infrared Spectroscopy (FTIR) showed the bonds in the transmittance spectrum are manufactured with carbon nanostructures in view. The first peaks are the O–H stretching vibration bands at (3417 and 2922) cm−1, (C–O–H at 1400, and 1317) cm−1, (C–H), (C=C), (C–O–H), (C=O), and (C–O) bonds at 2850, 1668, 1101, and 1026 cm−1 sequentially. The transmission electron microscopy (TEM) results presented that the spherical CQDs are in shape and on average possess a restricted distribution of sizes of fairly 10 nm. Also, optical properties were investigated by the UV–VIS absorption spectrum, peak at 225 nm showed absorption spectrum of it. Photoluminescence emission was studied using FS-Spectrometer operating at 364 nm, 374 nm, 384 nm, 384 nm, and 404 nm wavelength to excite a broad range of quantum dots. The PL test of the top of the surface of CQDs permitted the expectation that an excessive exciting will occur at the CQDs, where the upper layer has large energy gap with small quantum dots. As a result, the optical constants are analyzed, such as the energy gap, the extinction coefficient, and photoluminescence band and its applicability in optoelectronics.
Abstract:
The objective of this study, is to attempt to explain the reality of the Structural Imbalances in the Iraqi Economy during the period of research, by providing a quantitative analysis of the most important types of Imbalances, Which are represented by the disruption in the Productive Structure, the imbalance of the structure of Public Budget, and the imbalance of the Structure of Trade. The problem of the research, is the fact that the economy structure in Iraq has long suffered from an Imbalances in its economic structure, which are represented in the unequal relations between its constituent elements, according to the proportions levels defined by the economic theory.
... Show MoreAnodic electrodeposition was used to synthesize a composite electrode of nanostructured manganese dioxide/carbon fiber (CF) galvanostatically. Different characterization results of the nanostructured MnO2 were obtained by varying the H2SO4 concentration and the current density. Field emission scanning electron microscopy, X‐ray diffraction, and atomic force microscopy were utilized to characterize the prepared composite electrodes. The best conditions were: 0.3 mA cm−2 current density and 0.64 M H2SO4 concentration. The electrosorption performance of the MnO
Dr. Qahtan Al-Madfa’i’s architecture has been characterized by a particular characteristic that may be unique and extreme at the same time, that is the use of the distinctive three-dimensional structural coverings and the exploitation of structural construction to give an extra aesthetic touch to the composition of the building, to achieve the application of his universal ideas, which he strongly believed and defended.
In the period of the marked urban decline that the country undergoes now, which urges us toward making a comparison between the beginning of the modern Iraqi architecture and its ascending path up to its peak and the periods of its decline until it reached a very
... Show MoreChange the morphological characteristics with the change of the factors affecting it has been shown that the Tigris River has the characteristics of the morphology of the low values in terms of depth, width and perimeter wet and gradient which in turn affected the morphological and other characteristics in terms of the direction and pattern of runoff came through the study of 48 cross-section is taken of the Tigris River Year 2008 by section for each 1 km, it has been shown that the average width of the Tigris River does not exceed 221.1 meters and the average depth of 3.9 meters either wet ocean amounted to 268.9 meters and changed the cross-section area of the last section at a rate of 4594.3 square meters, and through the study turned
... Show MoreThis study aims to investigate the effect of low concentrations of sulfuric antioxidants on sperm of rams. This study was conducted in the field of sheep and goats of the Department of Livestock in the collage of Agricultural Engineering Sciences, University of Baghdad. The semen was collected using the artificial vagina at weekly rate (Pooled semen) and was subjected to different tests and then was divided into seven treatments but different concentrations of cysteine (0.5, 1mM) and glutathione (0.5, 1mM) and taurine (0.5, 1mM).The sample of the semen was diluted with Tris dilution (10: 1). The results showed that the low concentrations of glutathione, cysteine and taurine resulted i
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis study's objective is to assess how well UV spectrophotometry can be used in conjunction with multivariate calibration based on partial least squares (PLS) regression for concurrent quantitative analysis of antibacterial mixture (Levofloxacin (LIV), Metronidazole (MET), Rifampicin (RIF) and Sulfamethoxazole (SUL)) in their artificial mixtures and pharmaceutical formulations. The experimental calibration and validation matrixes were created using 42 and 39 samples, respectively. The concentration range taken into account was 0-17 μg/mL for all components. The calibration standards' absorbance measurements were made between 210 and 350 nm, with intervals of 0.2 nm. The associated parameters were examined in order to develop the optimal c
... Show More