Pub Date : 2024-02-29DOI: 10.24996/ijs.2024.65.2.12
I. H. Hashim, Bushra J. Hussein, Abdel Karim L. Oudah
The beam transport system is an essential part of any accelerator. This research investigates how a charged particle beam extracted from a plasma source behaves as it passes through a virtual beam transport system consisting of a series of C-bending magnets. This is done by analyzing the equations of motion of charged particles through this system. In addition, the study investigates the effect of the free drift space regions between these magnets and studies the behavior of charged particles beam passing through the suggested system for both horizontal and vertical planes using a computer program designed for this purpose. The results indicate many focusing regions along the beam path (beam envelop) for both the horizontal and vertical planes. The presence of free drift regions between the magnets strongly affects the beam envelop for both horizontal and vertical planes.
光束传输系统是所有加速器的重要组成部分。 本研究探讨了从等离子体源提取的带电粒子束在通过由一系列 C 型弯曲磁铁组成的虚拟光束传输系统时的表现。具体方法是分析带电粒子通过该系统的运动方程。此外,该研究还调查了这些磁体之间自由漂移空间区域的影响,并使用为此目的设计的计算机程序研究了带电粒子束通过建议系统时在水平和垂直平面上的行为。结果表明,在水平面和垂直面上,沿着光束路径(光束包络)有许多聚焦区域。磁体之间自由漂移区的存在对水平面和垂直面的光束包络有很大影响。
{"title":"Study of Focused Ions Beam Generated by a Plasma Source through a Series of C- Magnet Configuration","authors":"I. H. Hashim, Bushra J. Hussein, Abdel Karim L. Oudah","doi":"10.24996/ijs.2024.65.2.12","DOIUrl":"https://doi.org/10.24996/ijs.2024.65.2.12","url":null,"abstract":" The beam transport system is an essential part of any accelerator. This research investigates how a charged particle beam extracted from a plasma source behaves as it passes through a virtual beam transport system consisting of a series of C-bending magnets. This is done by analyzing the equations of motion of charged particles through this system. In addition, the study investigates the effect of the free drift space regions between these magnets and studies the behavior of charged particles beam passing through the suggested system for both horizontal and vertical planes using a computer program designed for this purpose. The results indicate many focusing regions along the beam path (beam envelop) for both the horizontal and vertical planes. The presence of free drift regions between the magnets strongly affects the beam envelop for both horizontal and vertical planes.","PeriodicalId":14698,"journal":{"name":"Iraqi Journal of Science","volume":"12 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140410068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.24996/ijs.2024.65.2.29
N. Ali, H. Al-Husseiny
A general treatment function with an epidemic model that involves the delay in the treatment period has been proposed and studied in this work. This model contains two compartments, namely susceptible denoted by and infected denoted by . The existence of all the fixed points has been determined. The system has two equilibrium points, namely the uninfected equilibrium point (UIEP) and the endemic equilibrium point (EEP). The conditions for local stability and Hopf bifurcation have been discussed. The stability of the periodic solutions and the direction of the Hopf bifurcation properties have been studied analytically and numerically.
{"title":"A robust Study of the Treatment Delay Effect on the Dynamics of Epidemic Disease","authors":"N. Ali, H. Al-Husseiny","doi":"10.24996/ijs.2024.65.2.29","DOIUrl":"https://doi.org/10.24996/ijs.2024.65.2.29","url":null,"abstract":" A general treatment function with an epidemic model that involves the delay in the treatment period has been proposed and studied in this work. This model contains two compartments, namely susceptible denoted by and infected denoted by . The existence of all the fixed points has been determined. The system has two equilibrium points, namely the uninfected equilibrium point (UIEP) and the endemic equilibrium point (EEP). The conditions for local stability and Hopf bifurcation have been discussed. The stability of the periodic solutions and the direction of the Hopf bifurcation properties have been studied analytically and numerically.","PeriodicalId":14698,"journal":{"name":"Iraqi Journal of Science","volume":"12 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140411010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.24996/ijs.2024.65.2.21
Ammar S. Mahmood, Jwan K. Khaleel
In the past years, there was an attempt to add one column to the e-abacus diagram, then another work followed by other researchers by adding several columns to the same diagram. At that time, a question remained, is it possible to add a row and later several rows on the same diagram? Or is this not an easy thing except under certain conditions? In this research, we will know when we can take these steps.
{"title":"Adding Rows in Main e-Abacus Diagrams","authors":"Ammar S. Mahmood, Jwan K. Khaleel","doi":"10.24996/ijs.2024.65.2.21","DOIUrl":"https://doi.org/10.24996/ijs.2024.65.2.21","url":null,"abstract":" In the past years, there was an attempt to add one column to the e-abacus diagram, then another work followed by other researchers by adding several columns to the same diagram. At that time, a question remained, is it possible to add a row and later several rows on the same diagram? Or is this not an easy thing except under certain conditions? In this research, we will know when we can take these steps.","PeriodicalId":14698,"journal":{"name":"Iraqi Journal of Science","volume":"83 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140411342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.24996/ijs.2024.65.2.33
D. R. Abdulrazzaq, N. M. Shati, Haider K. Hoomod
Cloud computing is one of the emerging technologies that expands the boundaries of the internet by using centralized servers to maintain data and resources. It allows users and consumers to use various applications provided by the cloud provider, but one of the major issues is task scheduling. Task scheduling is employed for the purpose of mapping the requests of users to the appropriate resources available. This paper provides a detailed survey of the available scheduling techniques for cloud environments based on six common metaheuristic algorithms. Those algorithms are the Cuckoo Search Algorithm (CSA), Chicken Swarm Optimization (CSO), Genetic Algorithm (GA), Bat Algorithm (BA), Whale Optimization Algorithm (WOA), and Grey Wolf Optimization (GWO). The literature is analyzed from three perspectives: task type, objectives to be optimized, simulation environment, and quality of service performance metrics. In addition, the research gaps and future directions for future investigation are presented.
{"title":"Task Scheduling in a Cloud Environment Based on Meta-Heuristic Approaches: A Survey","authors":"D. R. Abdulrazzaq, N. M. Shati, Haider K. Hoomod","doi":"10.24996/ijs.2024.65.2.33","DOIUrl":"https://doi.org/10.24996/ijs.2024.65.2.33","url":null,"abstract":" Cloud computing is one of the emerging technologies that expands the boundaries of the internet by using centralized servers to maintain data and resources. It allows users and consumers to use various applications provided by the cloud provider, but one of the major issues is task scheduling. Task scheduling is employed for the purpose of mapping the requests of users to the appropriate resources available. This paper provides a detailed survey of the available scheduling techniques for cloud environments based on six common metaheuristic algorithms. Those algorithms are the Cuckoo Search Algorithm (CSA), Chicken Swarm Optimization (CSO), Genetic Algorithm (GA), Bat Algorithm (BA), Whale Optimization Algorithm (WOA), and Grey Wolf Optimization (GWO). The literature is analyzed from three perspectives: task type, objectives to be optimized, simulation environment, and quality of service performance metrics. In addition, the research gaps and future directions for future investigation are presented.","PeriodicalId":14698,"journal":{"name":"Iraqi Journal of Science","volume":"22 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140411806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.24996/ijs.2024.65.2.27
I. T. Abbas, Manar Naji Ghayyib
Linear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of model that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we deal with the post optimality solution, or what is known as sensitivity analysis using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model will change the problem of linear programming and will affect the optimal solution. Therefore, we need a method that helps to stand on the impact of changing these constants on the optimal solution that has been reached. General concepts about the binary model and some related theories have also been addressed. By analyzing the sensitivity, we rely on real data for a company that transports crude oil and its derivatives. The mathematical model is formulated for it and the optimal solution is reached using the software. Ready-made sop WINQSB and then calculate the shadow price values for the binding constraints, in addition, linear programming under the fuzzy environment is reviewed, and a new method based on the prime numbers is used to solve the fuzzy parameters model.
{"title":"Using Sensitivity Analysis in Linear Programming with Practical Physical Applications","authors":"I. T. Abbas, Manar Naji Ghayyib","doi":"10.24996/ijs.2024.65.2.27","DOIUrl":"https://doi.org/10.24996/ijs.2024.65.2.27","url":null,"abstract":" Linear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of model that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we deal with the post optimality solution, or what is known as sensitivity analysis using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model will change the problem of linear programming and will affect the optimal solution. Therefore, we need a method that helps to stand on the impact of changing these constants on the optimal solution that has been reached. General concepts about the binary model and some related theories have also been addressed. By analyzing the sensitivity, we rely on real data for a company that transports crude oil and its derivatives. The mathematical model is formulated for it and the optimal solution is reached using the software. Ready-made sop WINQSB and then calculate the shadow price values for the binding constraints, in addition, linear programming under the fuzzy environment is reviewed, and a new method based on the prime numbers is used to solve the fuzzy parameters model.","PeriodicalId":14698,"journal":{"name":"Iraqi Journal of Science","volume":"2010 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140416261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.24996/ijs.2024.65.2.37
A. S. Abuhammad, Mahmoud Ali Ahmed
Negation is a linguistic phenomenon that can cause sentences to have their meanings reversed. It frequently inverts affirmative sentences into negative ones, affecting the polarity; therefore, the sentiment of the text also changes accordingly. Negation can be expressed differently, making it somewhat challenging to detect. As a result, detecting negation is critical for Sentiment Analysis (SA) system development and improvement and will increase classifier accuracy, but it also poses a significant conceptual and technical challenge. This paper aims to survey and gather the most recent research related to detecting negation in SA. Many researchers have worked and performed methods, including algorithmic, machine, and deep learning approaches such as Decision Tree (DT), Support Vector Machines (SVM), K-Nearest Neighbor (KNN), Naive Bayesian (NB), Logistic Regression (LR), Artificial Neural Networks (ANNs), Recurrent Neural Networks (RNNs), Bidirectional Long Short-Term Memory (BiLSTM), and other hybrid methods such as rule-based and machine learning, lexicon and machine learning, machine learning, and deep learning. It addresses and tries to identify the gaps in the current studies, laying the foundation for future studies in this field.
{"title":"Negation Detection Techniques in Sentiment Analysis: A Survey","authors":"A. S. Abuhammad, Mahmoud Ali Ahmed","doi":"10.24996/ijs.2024.65.2.37","DOIUrl":"https://doi.org/10.24996/ijs.2024.65.2.37","url":null,"abstract":" Negation is a linguistic phenomenon that can cause sentences to have their meanings reversed. It frequently inverts affirmative sentences into negative ones, affecting the polarity; therefore, the sentiment of the text also changes accordingly. Negation can be expressed differently, making it somewhat challenging to detect. As a result, detecting negation is critical for Sentiment Analysis (SA) system development and improvement and will increase classifier accuracy, but it also poses a significant conceptual and technical challenge. This paper aims to survey and gather the most recent research related to detecting negation in SA. Many researchers have worked and performed methods, including algorithmic, machine, and deep learning approaches such as Decision Tree (DT), Support Vector Machines (SVM), K-Nearest Neighbor (KNN), Naive Bayesian (NB), Logistic Regression (LR), Artificial Neural Networks (ANNs), Recurrent Neural Networks (RNNs), Bidirectional Long Short-Term Memory (BiLSTM), and other hybrid methods such as rule-based and machine learning, lexicon and machine learning, machine learning, and deep learning. It addresses and tries to identify the gaps in the current studies, laying the foundation for future studies in this field.","PeriodicalId":14698,"journal":{"name":"Iraqi Journal of Science","volume":"47 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140411688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.24996/ijs.2024.65.2.18
A. A. Abdulsahib, F. Fadhel, Jaafer Hmood Eidi
In this article, the Laplace transformation method in connection with the variational iteration method will be used to solve approximately fuzzy random ordinary differential equations. After that, the sequence of approximated closed form iterated solutions is derived based on the general Lagrange multiplier evaluated using the well-known convolution theorem of the Laplace transformation method. In addition, two examples are given and solved to illustrate the reliability, efficiency and applicability of the proposed method, they are simulated using computer programs with two different generations of stochastic processes, namely the Wiener process or Brownian motion, which are 1000 and 10000, respectively.
{"title":"Approximate Solution of Linear Fuzzy Random Ordinary Differential Equations Using Laplace Variational Iteration Method","authors":"A. A. Abdulsahib, F. Fadhel, Jaafer Hmood Eidi","doi":"10.24996/ijs.2024.65.2.18","DOIUrl":"https://doi.org/10.24996/ijs.2024.65.2.18","url":null,"abstract":"In this article, the Laplace transformation method in connection with the variational iteration method will be used to solve approximately fuzzy random ordinary differential equations. After that, the sequence of approximated closed form iterated solutions is derived based on the general Lagrange multiplier evaluated using the well-known convolution theorem of the Laplace transformation method. In addition, two examples are given and solved to illustrate the reliability, efficiency and applicability of the proposed method, they are simulated using computer programs with two different generations of stochastic processes, namely the Wiener process or Brownian motion, which are 1000 and 10000, respectively.","PeriodicalId":14698,"journal":{"name":"Iraqi Journal of Science","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140413166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.24996/ijs.2024.65.2.31
Ali Hassan Khudaier, A. Radhi
Diabetes mellitus (DM), a chronic, clinically heterogeneous condition, is becoming increasingly common all over the world. Insulin deficiency, resistance to insulin's actions on the body's surface, or both may lead to pancreatic beta-cell degeneration. Diabetes makes people more prone to its consequences, the most prevalent of which is diabetic retinopathy (DR). Deep learning algorithms surpass traditional classification models for illness diagnosis on photos of medical problems. Deep transfer learning models for medical DR detection were evaluated using the APTOS 2019 dataset. Deep transfer learning algorithms for medical diabetic retinopathy (DR) detection are being evaluated. MobileNet Convolutional Neural Networks (CNN) architecture is used to detect the DR in binary class classification tasks, which leverages pre-trained weights collected during the training process using the ImageNet database. Cohen Kappa, F1 score, recall, accuracy, and precision are some of the performance indicators used. According to the data, the given model is the most effective in terms of accuracy and training time for handling our challenges. Overall, MobileNet is a good pick. The following metrics were found to be accurate: 0.9455, precise: 0.94651, recall: 0.9455, F1 score: 0.94556, and Cohen Kappa score: 0.89083. This method might aid medical personnel in the early detection of diabetic retinopathy.
{"title":"Binary Classification of Diabetic Retinopathy Using CNN Architecture","authors":"Ali Hassan Khudaier, A. Radhi","doi":"10.24996/ijs.2024.65.2.31","DOIUrl":"https://doi.org/10.24996/ijs.2024.65.2.31","url":null,"abstract":" Diabetes mellitus (DM), a chronic, clinically heterogeneous condition, is becoming increasingly common all over the world. Insulin deficiency, resistance to insulin's actions on the body's surface, or both may lead to pancreatic beta-cell degeneration. Diabetes makes people more prone to its consequences, the most prevalent of which is diabetic retinopathy (DR). Deep learning algorithms surpass traditional classification models for illness diagnosis on photos of medical problems. Deep transfer learning models for medical DR detection were evaluated using the APTOS 2019 dataset. Deep transfer learning algorithms for medical diabetic retinopathy (DR) detection are being evaluated. MobileNet Convolutional Neural Networks (CNN) architecture is used to detect the DR in binary class classification tasks, which leverages pre-trained weights collected during the training process using the ImageNet database. Cohen Kappa, F1 score, recall, accuracy, and precision are some of the performance indicators used. According to the data, the given model is the most effective in terms of accuracy and training time for handling our challenges. Overall, MobileNet is a good pick. The following metrics were found to be accurate: 0.9455, precise: 0.94651, recall: 0.9455, F1 score: 0.94556, and Cohen Kappa score: 0.89083. This method might aid medical personnel in the early detection of diabetic retinopathy.","PeriodicalId":14698,"journal":{"name":"Iraqi Journal of Science","volume":"11 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140410439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.24996/ijs.2024.65.2.17
Saad Mahdi Jaber, H. H. Kadhem
In this work, the concept of the paracompact map has been generalized to other new types of maps, in addition to the fact that the paracompact map has been linked to these new maps. Accordingly, we will separate these new types of maps into two classes, the first class is called a strong form which implies a paracompact map under certain conditions. While the other class is called a weaker form of a paracompact map, whereas the paracompact map implies them. Finally, the composition operations of paracompact maps are studied.
{"title":"Certain Strong and Weak Types of Paracompact Maps","authors":"Saad Mahdi Jaber, H. H. Kadhem","doi":"10.24996/ijs.2024.65.2.17","DOIUrl":"https://doi.org/10.24996/ijs.2024.65.2.17","url":null,"abstract":" In this work, the concept of the paracompact map has been generalized to other new types of maps, in addition to the fact that the paracompact map has been linked to these new maps. Accordingly, we will separate these new types of maps into two classes, the first class is called a strong form which implies a paracompact map under certain conditions. While the other class is called a weaker form of a paracompact map, whereas the paracompact map implies them. Finally, the composition operations of paracompact maps are studied.","PeriodicalId":14698,"journal":{"name":"Iraqi Journal of Science","volume":"20 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140411647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.24996/ijs.2024.65.2.13
H. Noori, A. F. Abdulameer
This research aims to study the structural properties of cadmium telluride (CdTe) core QDs and cadmium telluride/ cadmium selenium (CdTe/CdSe) core-shell QDs at pH 12. The QDs were prepared using aqueous synthesis by reflux process. The structural properties of the QDs were studied using X-ray diffraction (XRD), Field Emission Scanning Electron Microscopy (FESEM), Energy Dispersive X-ray spectroscopy (EDX), and Transmission Electron Microscopy (TEM). The results of the XRD analysis for CdTe QDs and CdTe/CdSe QDs showed that they have three diffraction peaks in the directions (111), (220), and (331) with a slight shift in the diffraction peaks of CdTe/CdSe QDs, which indicates the successful packing of selenium atoms around CdTe. FESEM results confirmed that CdTe and CdTe/CdSe QDs possess quantum spherical NPs with diameters ranging from 27 nm to 41 nm. The EDX results confirm corrections of added concentrations The histogram images of the TEM analysis show that the diameters of CdTe and CdTe/CdSe are 7nm and 9 nm, respectively.
{"title":"Study the Structure Properties of CdTe and CdTe/CdSe Quantum Dots at pH=12 using an Aqueous Method","authors":"H. Noori, A. F. Abdulameer","doi":"10.24996/ijs.2024.65.2.13","DOIUrl":"https://doi.org/10.24996/ijs.2024.65.2.13","url":null,"abstract":" This research aims to study the structural properties of cadmium telluride (CdTe) core QDs and cadmium telluride/ cadmium selenium (CdTe/CdSe) core-shell QDs at pH 12. The QDs were prepared using aqueous synthesis by reflux process. The structural properties of the QDs were studied using X-ray diffraction (XRD), Field Emission Scanning Electron Microscopy (FESEM), Energy Dispersive X-ray spectroscopy (EDX), and Transmission Electron Microscopy (TEM). The results of the XRD analysis for CdTe QDs and CdTe/CdSe QDs showed that they have three diffraction peaks in the directions (111), (220), and (331) with a slight shift in the diffraction peaks of CdTe/CdSe QDs, which indicates the successful packing of selenium atoms around CdTe. FESEM results confirmed that CdTe and CdTe/CdSe QDs possess quantum spherical NPs with diameters ranging from 27 nm to 41 nm. The EDX results confirm corrections of added concentrations The histogram images of the TEM analysis show that the diameters of CdTe and CdTe/CdSe are 7nm and 9 nm, respectively.","PeriodicalId":14698,"journal":{"name":"Iraqi Journal of Science","volume":"17 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140413646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}