The electronic characteristics, including the density of state and bond length, in addition to the spectroscopic properties such as IR spectrum and Raman scattering, as a function of the frequency of Sn10O16, C24O6, and hybrid junction (Sn10O16/C24O6) were studied. The methodology uses DFT for all electron levels with the hybrid function B3-LYP (Becke level, 3-parameters, Lee–Yang-Parr), with 6-311G (p,d) basis set, and Stuttgart/Dresden (SDD) basis set, using Gaussian 09 theoretical calculations. The geometrical structures were calculated by Gaussian view 05 as a supplementary program. The band gap was calculated and compared to the measured values. The density of state of the hybrid junction (Sn10O16/C24O6) increased because of the increased number of degeneracy states. Theoretical values of bonds for C=C, C=O, and Sn-O are equal to 1.33, 1.20 and 2.27 Å respectively, these bonds values are in good agreement with experimental values of bond length of 1.34 for the C=C bond, 1.23 for the C=O bond, and 2.3 for the Sn-O bond. . The spectroscopic properties, such as IR spectra have shown a peak which is comparable to longitudinal modes of GO and tin dioxide SnO2 at (1582 and 690) cm-1, respectively.
Radio observations from astronomical sources like supernovae became one the most important sources of information about the physical properties of those objects. However, such radio observations are affected by various types of noise such as those from sky, background, receiver, and the system itself. Therefore, it is essential to eliminate or reduce these undesired noise from the signals in order to ensure accurate measurements and analysis of radio observations. One of the most commonly used methods for reducing the noise is to use a noise calibrator. In this study, the 3-m Baghdad University Radio Telescope (BURT) has been used to observe crab nebula with and without using a calibration unit in order to investigate its impact on the sign
... Show MoreThe aim of the current study is to demonstrate the effect of honey on the sperms characteristics (sperm concentration, sperm motility, grade of activity and sperm normal morphology) as well as pregnancy rate in mice. Sperms were obtained from caudal epididymis of male mice and prepared by adding10% of honey to the IVF medium using direct sperms activation technique for 30 minute incubation period before artificial insemination.
The study revealed a significant (P > 0.05) increase in active sperm motility (grade A and grade B) 49% and pregnancy rate 53.3% in female mice artificially inseminated with sperms. On the other hand, there were no significant differences in sperm con
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreBackground: Osteogenesis imperfecta (OI) is a rare congenital condition that results in bone fragility, recurrent fractures, and various extra-skeletal manifestations. Currently, intravenous bisphosphonate is the mainstay of medical treatment in OI. Objective: To identify the effect of current management strategies on Iraqi children diagnosed with OI. Methods: A retrospective study enrolled OI patients who were registered in Central Child Teaching Hospital, Baghdad, Iraq, from January 2015 to December 2022. We enrolled confirmed OI cases (either clinically and/or radiologically) who received cyclic pamidronate therapy for at least 3 cycles. They neither received other types of bisphosphonates nor underwent surgical intervention. Res
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreIn this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreImage quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show MoreNowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained