Pure SnSe thin film and doped with S at different percentage (0,3,5,7)% were deposited from alloy by thermal evaporation technique on glass substrate at room temperature with 400±20nm thickness .The influences of S dopant ratio on characterization of SnSe thin film Nano crystalline was investigated by using Atomic force microscopy(AFM), X-ray diffraction (XRD), energy dispersive spectroscopy (EDS), Hall Effect measurement, UV-Vis absorption spectroscopy to study morphological, structural, electrical and optical properties respectively .The XRD showed that all the films have polycrystalline in nature with orthorhombic structure, with preferred orientation along (111)plane .These films was manufactured of very fine crystalline size in the range of (18.167-51.126)nm, depending on the S ratio doping, the results of AFM indicated that these films were Nano crystalline with grain size (60.12-84.25)nm .Direct band …
In this work, substantial evidence was obtained for ligand reduction in cerium tetrakis acac complexes. Also, this ligand reduction of a negatively charged ligand proved to depend far less on the nature central metal than neutral ligands does. It is supposed that in Mz(acac)z complexes the charge is distributed evenly over the whole molecule. In this work these complexes were prepared and characterized by IR and CHN analysis to indicate the purities of these complexes. The electrochemistry techniques were shown as obtained for ligand reduction. This research was carried out at School of Chemistry and Molecular Science, Sussex University, U.K.
This study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce
... Show MoreThe virtual decomposition control (VDC) is an efficient tool suitable to deal with the full-dynamics-based control problem of complex robots. However, the regressor-based adaptive control used by VDC to control every subsystem and to estimate the unknown parameters demands specific knowledge about the system physics. Therefore, in this paper, we focus on reorganizing the equation of the VDC for a serial chain manipulator using the adaptive function approximation technique (FAT) without needing specific system physics. The dynamic matrices of the dynamic equation of every subsystem (e.g. link and joint) are approximated by orthogonal functions due to the minimum approximation errors produced. The contr
The growing water demand has raised serious concerns about the future of irrigated agriculture in many parts all over the world, changing environmental conditions and shortage of water (especially in Iraq) have led to the need for a new system that efficiently manages the irrigation of crops. With the increasing population growing at a rapid pace, traditional agriculture will have a tough time meeting future food demands. Water availability and conservation are major concerns for farmers. The configuration of the smart irrigation system was designed based on data specific to the parameters concerning the characteristics of the plant and the properties of soil which are measured once i
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreResearch summary
Perhaps the methods of mask that Arab poets resorted to in our time are due to the conditions of oppression and political and social repression that the Arab poet suffered from; So he strived to circumvent it, and it became a justification for hiding behind it. The research is available on a number of topics that lead to the definition of the mask technique and the beginning of its prevalence in Arabic literature after the Second World War, especially in recent decades by benefiting from historical stories, fairy tales and legends of all kinds. As well as defining the mask idiomatically and linguistically, and the beginning of its use in ancient religious rituals, and the special place it had in Greek plays. Poets
... Show MoreBoth traditional and novel techniques were employed in this work for magnetic shielding evaluation to shed new light on the magnetic and aromaticity properties of benzene and 12 [n]paracyclophanes with n = 3–14. Density functional theory (DFT) with the B3LYP functional and all-electron Jorge-ATZP and x2c-TZVPPall-s basis sets was utilized for geometry optimization and magnetic shielding calculations, respectively. Additionally, the 6-311+G(d,p) basis set was incorporated for the purpose of comparing the magnetic shielding results. In addition to traditional evaluations such as NICS/NICSzz-Scan, and 2D-3D σiso(r)/σzz(r) maps, two new techniques were implemented: bendable grids (BGs) and cylindrical grids (CGs) of ghost atoms (Bqs). BGs a
... Show More