Preferred Language
Articles
/
aBa8oIgBVTCNdQwCAnno
دراسة تأثير درجة حرارة التلدين على الخواص التركيبية والبصرية لأغشية الرقيقة ZnSe
...Show More Authors

الخلاصة ر 􀑧􀑧 ة التبخي 􀑧􀑧 رة بطريق 􀑧􀑧 ة المحض 􀑧􀑧 الرقيق ZnSe درس تأثير التلدين الحراري في بعض الخواص التركيبية والبصرية لأغشية ود 􀑧􀑧 ة حي 􀑧􀑧 لال تقني 􀑧􀑧 ن خ 􀑧􀑧 اعتين م 􀑧􀑧 دة س 􀑧􀑧 373,473 ) م )K راوح 􀑧􀑧 رارة تت 􀑧􀑧 درجات ح 􀑧􀑧 ة ب 􀑧􀑧 550±20 ) والملدن ) nm مك 􀑧􀑧 راري بس 􀑧􀑧 الح ة 􀑧􀑧 الاشعة السينية درست الخواص التركيبية واظھرت بأن الاغشية تمتلك طبيعة بلورية (تركيب مكعب). وبعد اجراء المعامل واص 􀑧􀑧 ا الخ 􀑧􀑧 ات ام 􀑧􀑧 ة الانخلاع 􀑧􀑧 ي كثاف 􀑧􀑧 ادة ف 􀑧􀑧 وري وزي 􀑧􀑧 اس البل 􀑧􀑧 ي المق 􀑧􀑧 ان ف 􀑧􀑧 ى نقص 􀑧􀑧 دين ادت ال 􀑧􀑧 ة التل 􀑧􀑧 د ان عملي 􀑧􀑧 الحرارية للغشاء وج ي 􀑧􀑧 رية الت 􀑧􀑧 ة البص 􀑧􀑧 وة الطاق 􀑧􀑧 بت فج 􀑧􀑧 ية حس 􀑧􀑧 ف الامتصاص 􀑧􀑧 ن طي 􀑧􀑧 البصرية فقد لاحظنا زيادة في الامتصاصية ونقصان النفاذية, وم 2.68-2.50 ) ا بعد اجراء الم

Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 13 2018
Journal Name
Arab Science Heritage Journal
اهمية أهمية التوثيق في المحافظة على الموروث البغدادي
...Show More Authors

    Much has been written about Baghdad in the history books and documents ,about the Origin  of its call , Reality ,history ,peoples ,Rulers and  all that have passed since  the beginning of creation and so far...

View Publication Preview PDF
Publication Date
Tue Mar 15 2022
Journal Name
Arab Science Heritage Journal
قراءة في المصدر واسم المصدر على وفق الاستعمال
...Show More Authors

What linguists mentioned about the infinitive and its use in the linguistic levels of speech, whether with its verb, or what was mentioned in the difference between the infinitive and the noun of the source, are matters that are related to the phenomenon of hearing in speech, a need necessitated by the nature of the linguistic law and its connection with the Arabic dialects, which proceeded in the linguistic levels to form Phenomenon inherent in the use of the source and the name of the source

View Publication Preview PDF
Publication Date
Tue Jan 14 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
التهرب الضريبي واثره على التنمية الاقتصادية في العراق
...Show More Authors

Highlights the role of taxes in being a major source of funding sources internal economic and social development, and then, any decrease in tax revenue caused by tax evasion, for example, would weaken the government's ability to finance their investments and core financing private sector investment as a result of reduced ability to increase their reserves's cash banks, as well as the weakening of the effectiveness of tax evasion taxes as a tool to guide economic activity in the framework of service for development, and to achieve justice. And the statement of the reasons for and methods of evasion mandated to pay the tax due on them, whether legitimately or illegal with the statement of the proposed methods to tackle tax evasion and elim

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A reflection of increased financing Equity on returns commons stocks
...Show More Authors

The research aims to study the effect of an increase in funding the Equity by issuing new common shares on revenues ordinary shares, despite the issuance and marketing costs and the introduction of new shareholders that companies incur when issuing new common shares but it is the most important methods used to finance the Equity is funding the common shares it provides money sufficient to finance the large investments of the company and enhance the confidence of dealers with the company, so I designed this research in order to identify the impact of increased funding Equity issue new common shares to common shares revenues.

This research has included some of the theoretical concepts to each of the Equity

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Evaluation Method of Mesh Protocol over ESP32 and ESP8266
...Show More Authors

Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
التطورات البيئية المعاصرة وانعكاساتها على نظام الإبلاغ المالي
...Show More Authors

Abstract                                           

           The developments of technology and information that is sweeping the world based on the factors of pressure on the accounting profession in general, and the authors of the accounting information. That becouse the makers of administrative decisions have become in need of new information fit and the environmental situation of the new competition and try to enter new markets,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2010
Journal Name
Political Sciences Journal
اضاءات على الانتخابات الشريعية في العراق عام 2010
...Show More Authors

اضاءات على الانتخابات الشريعية في العراق عام 2010

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability
...Show More Authors

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
International and Regional Competition for the African Coast
...Show More Authors

This study aimed at analyzing and studying the strategic and geopolitical importance of the Sahel region, which increased the regional competition for the resources of the region, especially the energy resources that have been and continue to be one of the axes of conflict and competition between these forces.
The researcher tried to review the competition between the international force, France, the United States of America, China, Algeria and Libya, and the African coast. We note that there is a positive correlation between the severity of the conflict and the intensity of the competition of the major powers to control the countries of the region and the extent of political and economic stability These countries are directly affecte

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF