Ge-Au infrared photoconductive detection was prepared from germanium single crystal which were doped with different gold concentration using thermal evaporation. The spectral resonsivity (Rλ), spectral detectivity (D*) were determined as function of wavelength, also the resistance, conductivity in dark and with illumination to infrared radiation, the gain and relative photo response have been measured with different gold concentration. Remarkable improvements in the photoresponse gain were observed for the highest resistance specimen at the expense of spectral detectivity values.
Huwaiza marsh is considered the largest marsh in the southern part of Iraq. It is located between 31° and 31.75° latitude and extends over the Iraqi-Iranian border; but the largest part lies in Iraq. It is located to the east of Tigris River in Messan and Basra governorates.
In this research, the variation of some water quality parameters at different locations of Huwaiza marsh were studied to find out its efficacy in the treatment of the contamination coming from the wastewater outfall of Kahlaa brokendown sewage treatment plant which lies on the Kahlaa River. This rive is the main feeder of Huwaiza marsh. Ten water quality sampling locations were chosen in this marsh. The water samples were taken during 2009 for three months; Janu
The paper presents an overview of theoretical aspects of small radio telescope antenna parameters. The basic parameters include antenna beamwidth, antenna gain, aperture efficiency, and antenna temperature. These parameters should be carefully studied since they have vital effects on astronomical radio observations. The simulations of antenna parameters were carried out to assess the capability and the efficiency of small radio telescopes to observe a point source at a specific frequency. Two-dimensional numerical simulations of a uniform circular aperture antenna are implemented at different radii. The small diameter values are chosen to be varied between (1-10) m. This study focuses on a small radio telescope with a diameter of 3 m sin
... Show MoreThe aims of this study are to explore the commercial artifacts in the following three kinds of vegetables oils, Nigella Sativa, Trigonella foenum-graecum Linn,and Zingiber officinale. These oils have been very popular medicinal plants which are commonly used in traditional medicine .These commercial oils have been compared with the extracts of these plants.
The physical properties of extracts and commercial oils of these plants have been stuied. We observed that the refractive index of the plants matches and non-significant, while specific gravity of Nigella Sativa has similar specific gravity in both extracts and commercial oil in contrast with Trigonella foenum Linn,and Zingiber officinale and we found significant difference (P<
Evolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological proce
... Show MoreBy definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturb
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Recent research looking for acknowledgment of strategically influence of Robinson and self question at progressing the reading comprehension for students of sixth class .
To achieve research goal so the researcher mentally chose primary sixth class at the school (Tashti the primary) that followed education directorate of province (Jamjamal)/Suliymania for the scholastic year 2012-2013 as application field for their experiment of boys' number reached to (95) (female and male)students in reality (32) of the first experimental group and (31) student (female and male) from controlled group, the researcher rewarded between of three variable groups (timing period, intelligence ,Kurdish language degr
... Show MoreThis article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP