The (NiTsPc) thin films operating by vacuum evaporation technique are high recital and good desirable for number of applications, were dumped on glass substrates at room temperature with (200±20nm) thickness and doped with Al at different percentage (0.01,0.03) besides annealing the sample with 200˚C for 1 hours . The stimuluses of aluminum dopant percentage on characterization of the dropped (Ni Ts Pc) thin films were studied through X-ray diffraction in addition from the attained results, were all the films have polycrystalline in nature, as well the fallouts of XRD aimed at film illustrations polycrystalline, depending on the Al ratio doping, the results, SEM exposed the surface is regularly homogeneous. Utilizing first-ideologies calculations, we demonstration that appropriate band gaps and optical properties adjacent to that of direct energy gap intended for wholly samples.
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MorePolymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room
... Show MoreThe current research aims to determine the impact of the cognitive reconstruction program on the development of psychological hardness among middle school students through the experimental verification of three hypotheses. The research sample consisted of (16) out of (450) students selected from Ibn Rushud preparatory school- Al-Rusafa 2. These participants have been randomly distributed into two equal groups. The researcher has used the method of cognitive reconstruction with the experimental group, whereas with the controlling group, he used nothing. The researcher has further used the scale of psychological hardness of Kobassa with the participants; the scale has been built in a way that suits the sample of the study, which consisted
... Show MoreThis research highlights the light on the general framework of accounting discloser in the Islamic banks, and show the types and the concepts of Cost Efficiency, In this present study, the sample included Fourteen Islamic banks, where the data was collected from the annual financial reports. Accordingly, the study in order to achieve the aims and access to the results based on the analytical method and the descriptive analysis, and conducted a Simple & Multiple Linear Regression analysis, in order to test hypotheses of the research by using of statistical analysis software (SPSS). The research has arrived to many results such as: the commitment of Islamic banks working in the Kingdome of Bahrain (Wholesale) to the requirements of the
... Show MoreThere are two ways that the contract might be formed with (contracting between persons who are attended and contracting between absence persons).the need for determining the precise moment of the contract , is so clear because there is a specify period separate between the declaration of acceptance and the knowledge with it .and it is clear from the four theories known for jurisprudence (theory of the declaration of the acceptance, theory of exporting the acceptance , theory of the arrival of the acceptance , theory of the knowledge with the acceptance ) . It is difficult to promote one theory on another one if we look at each one and the justification of its supporters and what the opponents of each theory expose. Legal background and diff
... Show MoreThis research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show More