Doppler broadening of the 511 keV positron annihilation ??? ? was used to estimate the concentration of defects ?? different deformation levels of pure alnminum samples. These samples were compressed at room temperature to 15, 22, 28, 38,40, and 75 % thickness reduction. The two-state ^sitron-trapping model has been employed. 'I he s and w lineshape parameters were measured using high-resolution gamma spectrometer with high pure germanium detector of 2.1 keV resolution at 1.33 MeV of 60Co. The change of defects concentration (Co) with the deformation level (e) is found to obey an empirical formula of the form Cd - A £ B where A and ? are positive constants that depend mainly on the deformation procedure and the temperature at which the deformation takes place.
In This paper, CuO thin films having different thickness (250, 300 , 350 and 400) nm were deposited on glass substrates by thermal vacuum evaporator. The thermal oxidation of this evaporated film was done in heated glass at temperature (300 in air at one hour. The study of X-ray diffraction investigated all the exhibit polycrystalline nature with monoclinic crystal structure include uniformly grains. Thin film’s internal structure topographical and optical properties. Furthermore, the crystallization directions of CuO (35.54 , 38.70 ) can be clearly observed through an X-ray diffraction analysis XRD, Atomic Force Microscope AFM (topographic image) showed that the surface Characteristics , thin films crystals grew with increases in either
... Show MoreThe contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting te
... Show MoreThe research aims to apply one of the techniques of management accounting, which is the Quality Function Deployment(QFD) on the Pepsi product in Baghdad Soft Drinks Company and to determine the technical requirements objectively that have been applied in practice in Baghdad Soft Drinks Company / a private shareholding company, as it focuses on meeting the quality requirements and achieving positive quality to provide a product It meets the requirements of current and future customers, hence the importance of research that indicates that the Quality Function Deployment(QFD) is a useful tool to develop the requirements of new products, being a design process driven by customers through their voices, and thus contribute to achieve a competi
... Show MoreThe zeolite's textural properties have a significant effect on zeolite's effectiveness in the different industrial processes. This research aimed to study the textual properties of the NaX and FeX zeolites using the nitrogen adsorption-desorption technique at a constant low temperature. According to the International Union of Pure and Applied Chemistry, the adsorption-desorption isotherm showed that the studied materials were mixed kinds I/II isotherms and H3 type hysteresis. The Brunauer-Emmett-Teller isotherm was the best model to describe the nitrogen adsorption-desorption better than the Langmuir and Freundlich isotherms. The obtained adsorption capacity and Brunauer-Emmett-Teller surface area values for NaX were greater than FeX. Ac
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreThis study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce
... Show More