In this research Bi2S3 thin films have been prepared on glass substrates using chemical spray pyrolysis method at substrate temperature (300oC) and molarity (0.015) mol. Structural and optical properties of the thin films above have been studied; XRD analysis demonstrated that the Bi2S3 films are polycrystalline with (031) orientation and with Orthorhombic structure. The optical properties were studied using the spectral of the absorbance and transmission of films in wavelength ranging (300-1100) nm. The study showed that the films have high transmission within the range of the visible spectrum. Also absorption coefficient, extinction coefficient and the optical energy gap (Eg) was calculated, found that the film have direct energy gap equal to 2.8 eV.
This research aims to study the target costing and value chain with their complimentary relationship in reducing product costs, meeting the needs of customer, and achieving strategic competitive advantage for manufacturing corporations in response to face international competition, technological development and continuous changing expectations of customers. No doubt, the target costing and value chain both currently occupy a great deal of the attention of managers and accountants at the manufacturing corporations due to the significance to insure their continuity, growth and development. This significance has been the main motive to examine the role of target costing and value chain in a sample of public corporations of the
... Show MoreThe exchange rate is of great importance at the global and local levels alike, as this importance increases with the increasing rates of development of economic relations between countries of the world due to openness and integration into the global economy, expressed by the expansion of the volume of trade and financial relations between countries. The Central Bank of Iraq has set the need to stabilize this price as a goal to reduce inflation rates and reduce them to the internationally accepted rates by using the foreign currency sale window to achieve a balance between the forces of supply and demand for foreign currency and to preserve the value of the Iraqi dinar. The research concluded that the central bank was It has a maj
... Show MoreThe research aims to study the basic concepts of the underwriting policy with its various indicators. The researcher studies the underwriting policy with its various indicators (sex, health status, age of the insured, insurance amount, The method of acceptance, payment method, and duration of insurance) where each of these indicators constitute an important factor in the productivity of life insurance policies, where the productivity of life insurance policies face many difficulties because insurance is a service and not a tangible material commodity and its benefits and not current. Therefore, the life insurance company needs to use a prudent underwriting policy so as not to endanger its financial position due to the expansion of the un
... Show MoreThis research paper studies the alienation of the intellectuals in the modern novel through the study of two alienated characters, John Marcher in Henry James's The Beast in the Jungle, and Mr. Duffy in James's Joyce's "A Painful Case." As a result of the complexity of life in the industrial societies, the individuals, especially the intellectual ones, feel themselves unable to integrate into social life; they fear society and feel that it endangers their individuality and independence. Thus, these characters live on the fringe of the societ
... Show MoreThe research aims to develop alternatives to transportation at the entrance to the Educational City (University of Baghdad) during the morning and evening peaks, which result from of the traffic congestion at the entrances to the educational city (the University of Baghdad), and affects the emotional, functional, and social performance of the whole city, and leads to hotbeds of confluence and congestion at the entrances in the morning and evening peaks. This movement was measured on the ground for pedestrians and vehicles. Some criteria were adopted to determine the density of road length to the area and density of roads for the number of users and the rate of the area served by roads. The research reviews the experiences of some
... Show MoreAudio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some
... Show MoreThis paper highlights the main features of conjunctive adverbials and their occurrence in English academic prose. It accounts for the semantic roles of conjunctive adverbials, forms in which they are used, their positions within a sentence, and their frequency of occurrence in different registers with special reference to academic prose. It also tries to investigate possible differences in men's and women's use of conjunctive adverbials.
Keyword: conjunctive adverbials, linking adverbials, stance adverbials, circumstance adverbials, academic prose
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More