Tin oxide was deposited by using vacuum thermal method on silicon wafer engraved by Computer Numerical Controlled (CNC) Machine. The inscription was engraved by diamond-made brine. Deep 0.05 mm in the form of concentric squares. Electrical results in the dark were shown high value of forward current and the high value of the detection factor from 6.42 before engraving to 10.41 after engraving. (I-V) characters in illumination with powers (50, 100, 150, 200, 250) mW/cm2 show Improved properties of the detector, Especially at power (150, 200, 250) mW/cm2. Response improved in rise time from 2.4 μs to 0.72 μs and time of inactivity improved 515.2 μs to 44.2 μs. Sensitivity angle increased at zone from 40o to 65o.
: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.
The tight gas is one of the main types of the unconventional gas. Typically the tight gas reservoirs consist of highly heterogeneous low permeability reservoir. The economic evaluation for the production from tight gas production is very challenging task because of prevailing uncertainties associated with key reservoir properties, such as porosity, permeability as well as drainage boundary. However one of the important parameters requiring in this economic evaluation is the equivalent drainage area of the well, which relates the actual volume of fluids (e.g gas) produced or withdrawn from the reservoir at a certain moment that changes with time. It is difficult to predict this equival
The national pharmaceutical industry is pivotal for both the health sector and the national economy. This study aims to identify determinants of national drug products acceptance. The objectives of this study were to quantitatively measure the level of patient and community pharmacist acceptance of national drug products available in community pharmacies and to qualitatively explore the barriers facing national pharmaceutical companies and investigate the suggested solutions.
This cross-sectional study used an explanatory mixed method design. It was conducted in Baghdad, Iraq from July through October 2018. The stud
The present study focuses on synthesizing solar selective absorber thin films, combining nanostructured, binary transition metal spinel features and a composite oxide of Co and Ni. Single-layered designs of crystalline spinel-type oxides using a facile, easy and relatively cost-effective wet chemical spray pyrolysis method were prepared with a crystalline structure of MxCo3−xO4. The role of the annealing temperature on the solar selective performance of nickel-cobalt oxide thin films (∼725 ± 20 nm thick) was investigated. XRD analysis confirmed the formation of high crystalline quality thin films with a crystallite si
Samples of Bi1.6Pb0.4Sr2Ca2Cu3O10+δ superconductor were prepared by solid-state reaction method to study the effects of gold nanoparticles addition to the superconducting system, Nano-Au was introduced by small weight percentages (0.25, 0.50, 0.75, 1.0, and 1.25 weight %). Phase identification and microstructural
characterization of the samples were investigated using XRD and SEM. Moreover, DC electrical resistivity as a function of the temperature, critical current density Jc, AC magnetic susceptibility, and DC magnetization measurements were carried to evaluate the relative performance of samples. x-ray diffraction analysis showed that both (Bi,Pb)-2223 and Bi-2212 phases coexist in the samples having an orthorhombic crystal struct
In this work the strain energy of tetrahedrane and its nitrogen substituted molecules were calculated by isodesmic reaction method according to DFT quantum chemical fashion, the used basis set was 6-31G/B3-LYP, in addition all structures were optimized by RM1 semi-empirical method. From the obtained data we estimate an empirical equation connect between strain energy of the molecule with charge functions represented by dipole moment of the molecule plus accumulated charge density involved within the tetrahedron frame plus the number of nitrogen atoms. The results indicate the charge spreading factors by polarization and processes are the most important factors in decreasing the strain energy.
In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More