The combination of carbon nanotubes (CNT) and conducting polymers offers an attractive route for the production of novel compounds that can be used in a variety of applications such as sensors, actuators, and molecular scale electronic devices. In this work, functionalized multiwall carbon nanotubes (f-MWCNTs) were added in different load ratios (3 wt%, 5 wt% and 10 wt%) to thiophen (PTh) polymer to procedure PTh/CNTs nanocomposite and deposited on porous silicon substrate by electropolarization. Photoconductive detectors were fabricated using PTh/f-MWCNTs matrix to work in the near region and middle IR regions. These detectors were illuminated by semiconductor laser diode wavelength of 808(nm) and Nd-YAG laser of wavelength 1064 (nm) to study the I-V characteristics and figures of merit. FTIR spectra assignments verify that the thiophene groups were successfully introduced into the carbon nanotubes. SEM images reflect that the electro polymerization process gives well coating for the CNTs by PTh. The conductivity of PTh as a function of temperature increased about 30 times due to addition of f-MWCNTs. Figures of merit reflect a good IR radiation sensitivity and photo response. The specific detectivity was in order of 108 (cm.Hz1/2/W) for both IR regions. The rise and fall times of the output signal are about of 192 (μs) and 121 (μs) respectively for load ratio 5wt% of CNT, which consider good values for these types of detectors.
Objective: This study aimed to evaluate the effectiveness of the Benson Relaxation Technique (BRT) in reducing pain during femoral artery sheath removal after percutaneous coronary intervention (PCI). Methods and Materials: A randomized controlled trial was conducted at three cardiac centers in Iraq. A total of 58 patients undergoing therapeutic PCI were randomly assigned into two groups: intervention (n=27) and control (n=31). The intervention group received BRT for 10 minutes before and after sheath removal. Pain was assessed using the Visual Analogue Scale (VAS) immediately after the procedure. Demographic data and clinical variables were collected. Data were analyzed using SPSS v26 and non-parametric tests (Mann-Whitney U, Krus
... Show MoreThis research analyses the tweets of Iraqi politicians (leaders) that took place simultaneously with the formation of the Iraqi government after the elections in 2018. The formation of the Iraqi government was considered one of the most critical issues that emerged in the political process to which the Iraqi media as well as social networking sites paid considerable attention. In this regard, Iraqi political leaders have published many tweets concerning the formation of the government, some of them have caused great controversy in the political climate. As Twitter is one of the most digital platforms that have been widely used on the global scale in recent years, politicians have employed it to publish their opinions, ideas, and to excha
... Show MoreThis research aims to predict the value of the maximum daily loss that the fixed-return securities portfolio may suffer in Qatar National Bank - Syria, and for this purpose data were collected for risk factors that affect the value of the portfolio represented by the time structure of interest rates in the United States of America over the extended period Between 2017 and 2018, in addition to data related to the composition of the bonds portfolio of Qatar National Bank of Syria in 2017, And then employing Monte Carlo simulation models to predict the maximum loss that may be exposed to this portfolio in the future. The results of the Monte Carlo simulation showed the possibility of decreasing the value at risk in the future due to the dec
... Show MoreAbstract The Object of the study aims to identify the effectiveness of using the 7E’s learning cycle to learn movement chains on uneven bars, for this purpose, we used the method SPSS. On a sample composed (20) students on collage of physical education at the university of Baghdad Chosen as two groups experimental and control group (10) student for each group, and for data collection, we used SPSS After collecting the results and having treated them statistically, we conclude the use 7E’s learning cycle has achieved remarkable positive progress, but it has diverged between to methods, On this basis, the study recommended the necessity of applying 7E’s learning cycle strategy in learning the movement chain on uneven bar
... Show MoreThe dangers of (Israel's) integration with Arab countries in the middle east region will threaten the Arab security structure dimension, which the latter makes the Arab regional system vulnerable for distortion due to its nominal and symbolic value which is far from the Arab self and questioning with its effectiveness in comparing with the real capabilities to Arab countries in achieving the common targets. So, how to assess the different problems that began to hit the structure of the Arab regional system? and how to pledge an allegiance after putting forward what is known as the American Deal of the Century for the administration of former US President Donald Trump for making another step toward normalization with (Israel)?. The reveal
... Show MoreArgumentation is not a contemporary, yet a deep rooted intellectual phenomenon dates back to Romans and Greeks times. The argumentative elements ,the author is trying to convey to the reader, are linguistic procedures aim at persuading and being persuaded of what is true. The present study traces, through Camus’ novel The plague, the best method to construct argumentative techniques used to express the author’s deep philosophies.
Résumé
L’argumentation n’est pas un phénomène intellectuel nouveau, ses origines reviennent aux savants grecs et romains. Elle est une act
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreThere is no doubt that the field of education and teaching (in any country and whatever its ruling system varies “d”) is considered one of the most specific and sensitive field, because it is related to the building of human. And as the human is a purpose (aim) and the means in the same time and he is the strategist capital, so he way of his rearing, education, choosing the educator, methods of working and the aims are considered serious matters.
The educational process has aim determined by the society for him self through its working establishments in this field and these are the official and public establishments. And as he feels that the establishments have failed to achieve its d
... Show More