High temperature superconductors materials with composition Bi1.6-xSbxPb0.4Sr2Ca2-yCdyCu3OZ (x = 0, 0.1, 0.2 and 0.3) and (y = 0.01 and 0.02), were prepared by using the chemical reaction in solid-state ways, and test influence of partial replacement of Bi and Ca with Sb and Cd respectively on the superconducting properties, all samples were sintered at the same temperature (850 oC) and for the same time (195 h). The structural analysis of the prepared samples was carried out using X-ray diffraction (XRD) measurements performed at room temperature, scanning electron microscope (SEM) and dc electrical resistivity was measured as a function of temperature. It was found that the sample prepared by partial substitution of Sb at ratio (x= 0.2) and Cd with ratio (y=0.01), has the maximum value of zero resistance temperature, where was the TC(onset) and TC(0) values for this sample are (140 K) and (123 K) respectively, and XRD results reveal that this sample has the highest percentage of Bi- 2223 phase, as well as the analysis of XRD patterns of the prepared materials showed polycrystalline structure and signalize that all samples had an orthorhombic crystalline structure. It was concluded that Sb2O3 nanoparticles it may be acts as a flux agent in the matrix to lower the partial melting temperature of the samples and that leads to the promotion of the high-TC phase.
One of the main aims of Metrical Phonology Theory (MTT) is to provide the stress of poetry on the syllable, the foot, and the phonological word levels. Analyzing poetry embodies one of the most prominent and controversial metrical issues as the subsumed number and types of syllables, feet, and meters are balanced compared to other literary texts. The MTT saw the light during the late seventies (1975) and (1977) by Liberman and Prince, who produced it as part of non-linear phonology. Its roots originated in prosody, which studies poetic meter and versification. The basis of the metrical analysis is the prosodic analysis developed in London by Firth and his students in 1950. This study aims to identify the values of five metri
... Show MoreThe importance of the construction sector and its Great role in the provision of services and infrastructure, reduce poverty, improve living conditions and improve the economic situation in the country, impose attention to the way in which the projects implemented for its improvement and to get successful projects. The objective of this research was to determine the criteria for success as well as critical success and failure factors that have a significant impact on project success. A selected 75 engineer (department managers, project managers and engineers) are asked to fill the questionnaire form, Sixty-seven valid questionnaire forms were analyzed statistically to get search results, which were as follows : Twe
... Show MoreAbstract The research aims to identify the psychological and health risks that a child might be exposed to by playing with hazardous toys such as pellet guns. To this end, the researcher has visited Ian Al-Haytham Eye Hospital in Baghdad, the emergency department to figure out the rate of injuries in Children for the consecutive years (2017-2018) and the first Month of (2019). The psychological risks as a result of disability are represented by the inability to accommodate the surrounding environment well. Additionally, the child experiences a kind of tension, conflict, and going in psychological crises through introversion, isolation, withdrawal tendencies,
... Show MoreThe combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show MoreBackground: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.
Type of the study: cross –sectional study.
Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of
... Show MoreIn this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.
The global food supply heavily depends on utilizing fertilizers to meet production goals. The adverse impacts of traditional fertilization practices on the environment have necessitated the exploration of new alternatives in the form of smart fertilizer technologies (SFTs). This review seeks to categorize SFTs, which are slow and controlled-release Fertilizers (SCRFs), nano fertilizers, and biological fertilizers, and describes their operational principles. It examines the environmental implications of conventional fertilizers and outlines the attributes of SFTs that effectively address these concerns. The findings demonstrate a pronounced environmental advantage of SFTs, including enhanced crop yields, minimized nutrient loss, improved nut
... Show MoreIn this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreThe present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More