Spin coating technique has been applied in this work to prepared Xerogel films doped with Rhodamine 6G laser dyes. The solid host of laser dye modifies its spectroscopic properties with respect to liquid host. During the spin coating process the dye molecules suffer from changing their environment. The effects of three parameters were studied here: the spinning speed, multilayer coating and formaldehyde addition
novel spectrofluorimetric flow injection analysis (FIA) method was developed for the selective quantification of ascorbic acid via fluorescence quenching of serotonin hydrochloride. The system employs a custom-designed photometric array comprising 16 irradiation sources arranged in a dual-axis matrix—eight aligned horizontally and eight orthogonally, enabling multi-angle excitation and enhanced spectral resolution. Fluorescence signals were captured using a twin-pair solar cell detector, offering high sensitivity and minimal optical interference. The method exhibited a linear calibration range of 0.1–30 limit of detection (LOD) of 0.025 μ μ g/mL with a correlation coefficient (r mol /L, equivalent to 4.403 * 10 4 μ 2 ) of 0.9966, a g
... Show MoreAugmented reality technology is a modern technique used in all fields, including: medicine, engineering and education, and has received attention from officials in the educational process at present; The focus of this research is on the degree of use of augmented reality among field experience students in the project's optimal investment program for teaching staff and their difficulties, applied to a sample of 75 students, through a questionnaire prepared by the researcher as a tool to determine the degree of use, as well as difficulties. The researcher addressed the subject through two main axes to determine the degree of use, as well as the difficulties preventing teachers and learners from using this technique. The results of the rese
... Show MoreThe child realize that the meals time provide golden opportunities to get the attention the child needs. However, many difficulties that may appear about eating food can be avoided, if the family used the right way in dealing with this problem. The study aims, in this case, at searching for the reasons that lies behind the child's obstinacy in eating his food and the attempt to study some variables that is related to the research topic.
The results are summed up as follows:
- The number of the sample children is 3 of both sexes between the ages of 3 to 6 years
Abstract
The purpose of the research is to determine how much do the external auditors’ qualifications in Iraq match the international requirements? And determine the necessary and priority requirements that the auditor should have in order to adapt with the changes in the community and the profession. The research partially focuses on comparing international institutes curriculum requirements with the local institutes’ curriculum requirements. Furthermore, it compares examinations of local students with the questions of these institutes and compares the requirements of these institutes to continuing vocational education with the local, as well as analyzes and presents the questionnaire results to find out the necessa
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show More