Polymer electrolytes systems compose of (PEO+KI+I2) and (PEO+RbI+I2) with different concentration, and a fixed amount of ethylene carbonate (EC) and propylene carbonate (PC) over temperatures range 293-343 K prepared by solution cast method. The conductivity and dielectric constant of the gel electrolytes were studied. The conductivity of the electrolytes Ss & Hs increases steadily with increased concentration of salt KI and RbI. The higher value of conductivity of (4.7 10-3 @ RT S.cm-1) for S5 electrolyte which contains (KI 50%). Whereas the maximum amount of conductivity of (5.4 10³ @RT S.cm⁻ˡ) for H5 electrolyte which contains (RbI 50%) the ionic conductivity depends on the ionic radii of the migrating species (cation K⁺, Rb⁺) effect on it. As the temperature increase, the number of free ions also increases, thus increases the diffusion of ions through their free volume of the polymer. The dielectric constant decrease at higher frequencies due to the inability of dipoles to align quickly with the change of applied field. The dielectric constant proportional positively with variation temperature causes an increase in the dielectric constant. The higher the value of (εr), the better is the electrical conductivity.
We demonstrate the results of a mathematical model for investigation the nonlinear Stimulated Brillouin Scattering (SBS), which can be employed to achieve high optical amplifier. The SBS is created by interaction between the incident We demonstrate the results of a mathematical model for investigation the nonlinear Stimulated Brillouin Scattering (SBS), which can be employed to achieve high optical amplifier. The SBS is created by interaction between the incident light and the acoustic vibration fiber. The design criteria and the amplification characteristic of the Brillouin amplifier is demonstrated and discussed for fiber Brillouin amplifier using different pump power with different fiber length. The results show, high Brillouin gain can
... Show MoreObjective: The aim of this study is to determine the factors affecting birth space interval in a sample of women.
Methodology: A cross-sectional study conducted in primary health centers in Al-Tahade and Al- Shak Omar in
Baghdad city. Data were collected by direct interview using questionnaire especially prepared for the study.
Sample size was (415) women in age group (20-40) years who were chosen randomly.
Results: Analysis of data shows highest rate of women (31.8%) had a birth space interval of (8-12) months
followed by (26.7%) had a birth space interval of (19-24) months, (20.2%) had a birth space interval of (>24)
months and (16.1%) had a birth space interval of (13-18) months respectively, while lower rate of w
The cinematic story depends on many construction techniques that together constitute the story features technically and the secondary events are considered one of these basic techniques that are directly affected by the employment mechanisms inside the cinematic achievement. This subject initiated the two researchers to decide the title of the research: (Mechanisms of Employing Secondary Event in Cinematographic Discourse). The research is divided into an introduction that included the problem details, the aim and defining the terms used. The first section was the act and the event in the cinematic story, which addressed the relation between the act and the event and the nature of the simulation that tries to ascend the human act
... Show MoreKE Sharquie, AA Noaimi, AG Al-Ghazzi, Journal of Dermatology & Dermatologic Surgery, 2015 - Cited by 19
It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.