Preferred Language
Articles
/
ijp-458
Improvement the efficiency of SnO2/n-Si detector by engraving method using a CNC machine
...Show More Authors

Tin oxide was deposited by using vacuum thermal method on silicon wafer engraved by Computer Numerical Controlled (CNC) Machine. The inscription was engraved by diamond-made brine. Deep 0.05 mm in the form of concentric squares. Electrical results in the dark were shown high value of forward current and the high value of the detection factor from 6.42 before engraving to 10.41 after engraving. (I-V) characters in illumination with powers (50, 100, 150, 200, 250) mW/cm2 show Improved properties of the detector, Especially at power (150, 200, 250) mW/cm2. Response improved in rise time from 2.4 μs to 0.72 μs and time of inactivity improved 515.2 μs to 44.2 μs. Sensitivity angle increased at zone from 40o to 65o.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 21 2022
Journal Name
Научный форум: Филология, искусствоведение и культурология: сб. ст. по материалам Lvi междунар. науч.-практ. конф. – No 2 (56). – М
Comparative analysis of zoomorphic metaphors in Russian and Arabic as a method for studying linguoculturology
...Show More Authors

: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.

Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
A Magnetic Field Concentration Method for Magnetic Flux Leakage Detection of Rail-Top Surface Cracks
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Mon Jun 12 2017
Journal Name
Day 3 Wed, June 14, 2017
A New Practical Method for Predicting Equivalent Drainage Area of Well in Tight Gas Reservoirs
...Show More Authors
Abstract<p>The tight gas is one of the main types of the unconventional gas. Typically the tight gas reservoirs consist of highly heterogeneous low permeability reservoir. The economic evaluation for the production from tight gas production is very challenging task because of prevailing uncertainties associated with key reservoir properties, such as porosity, permeability as well as drainage boundary. However one of the important parameters requiring in this economic evaluation is the equivalent drainage area of the well, which relates the actual volume of fluids (e.g gas) produced or withdrawn from the reservoir at a certain moment that changes with time. It is difficult to predict this equival</p> ... Show More
View Publication
Scopus (12)
Crossref (8)
Scopus Crossref
Publication Date
Thu May 28 2020
Journal Name
Journal Of Generic Medicines: The Business Journal For The Generic Medicines Sector
Determinants of national drug products acceptance across patients, pharmacists, and manufacturers: A mixed method study
...Show More Authors
Introduction

The national pharmaceutical industry is pivotal for both the health sector and the national economy. This study aims to identify determinants of national drug products acceptance. The objectives of this study were to quantitatively measure the level of patient and community pharmacist acceptance of national drug products available in community pharmacies and to qualitatively explore the barriers facing national pharmaceutical companies and investigate the suggested solutions.

Methods

This cross-sectional study used an explanatory mixed method design. It was conducted in Baghdad, Iraq from July through October 2018. The stud

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Mon Oct 07 2024
Journal Name
Semiconductor Science And Technology
A facile method of deriving solar selective nickel-cobalt oxide thin films via spraying process
...Show More Authors
Abstract<p>The present study focuses on synthesizing solar selective absorber thin films, combining nanostructured, binary transition metal spinel features and a composite oxide of Co and Ni. Single-layered designs of crystalline spinel-type oxides using a facile, easy and relatively cost-effective wet chemical spray pyrolysis method were prepared with a crystalline structure of M<sub>x</sub>Co<sub>3−x</sub>O<sub>4</sub>. The role of the annealing temperature on the solar selective performance of nickel-cobalt oxide thin films (∼725 ± 20 nm thick) was investigated. XRD analysis confirmed the formation of high crystalline quality thin films with a crystallite si</p> ... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Sep 10 2018
Journal Name
Iraqi Journal Of Physics
Improvement of superconducting parameters of Bi1.6Pb0.4Sr 2Ca 2Cu 3O10+ δ added with Au nanoparticles
...Show More Authors

Samples of Bi1.6Pb0.4Sr2Ca2Cu3O10+δ superconductor were prepared by solid-state reaction method to study the effects of gold nanoparticles addition to the superconducting system, Nano-Au was introduced by small weight percentages (0.25, 0.50, 0.75, 1.0, and 1.25 weight %). Phase identification and microstructural
characterization of the samples were investigated using XRD and SEM. Moreover, DC electrical resistivity as a function of the temperature, critical current density Jc, AC magnetic susceptibility, and DC magnetization measurements were carried to evaluate the relative performance of samples. x-ray diffraction analysis showed that both (Bi,Pb)-2223 and Bi-2212 phases coexist in the samples having an orthorhombic crystal struct

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Global Pharma Technology
Calculation of Stabilization Energy of Tetrahedrane with its Nitrogen Substituted Derivatives by DFT Method and Driving an Empirical Relation Connect it with Charge Functions of the Molecule
...Show More Authors

In this work the strain energy of tetrahedrane and its nitrogen substituted molecules were calculated by isodesmic reaction method according to DFT quantum chemical fashion, the used basis set was 6-31G/B3-LYP, in addition all structures were optimized by RM1 semi-empirical method. From the obtained data we estimate an empirical equation connect between strain energy of the molecule with charge functions represented by dipole moment of the molecule plus accumulated charge density involved within the tetrahedron frame plus the number of nitrogen atoms. The results indicate the charge spreading factors by polarization and processes are the most important factors in decreasing the strain energy.

Preview PDF
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref