In this paper, silicon carbonitried thin films were prepared by the method of photolysis of the silane (SiH4) and ethylene (C2H4) gases, with and without ammonia gas (NH3), which is represented by the ratio between the (PNH3) and (PSiH4 + PC2H4 + PNH3), (which assign by the letter X), X has the values (0, 0.13, 0.33). This method carried out by using TEA-CO2 laser, on glass substrate at (375 oC), deposition rate (0.416-0.833) nm/pulse thin film thickness of (500-1000) nm. The optical properties of the films were studied by using Absorbance and Transmittance spectrums in wavelength range of (400-1100) nm, the results showed that the electronic transitions is indirect and the energy gap for the SiCN films increase with increasing of nitrogen content (X parameter), as the films tend to be transparent at higher ammonia gas pressures.
Background: Various studies conducted in many parts of the world suggest that there is lack of public awareness and knowledge of various aspects related to diabetes. With proper education, awareness, earlier detection and better care, many complications and co-morbidities can be reduced in diabetic population.Objectives: to evaluate the level of awareness of diabetes mellitus type 2 patients regarding their disease and its' complications.Methods: Cross – sectional survey was conducted during November and December 2011, in the Medical centers of Al Baladiat, Mustansyria and Zuafranya, including 145 type 2 diabetic patients (58.6 % males, 41.4% females) who were subjected to self–structured questionnaires regarding different aspects of
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreThe current research aims to identify the level of both psychological comfort and job performance among a sample of high school teachers for the academic year (2019-2020). The researcher has built two tools to measure psychological comfort, and one to measure job performance. The researcher applied the two scales to a random stratified sample of (100) male and female teachers. The results showed a low level of feeling with psychological comfort among secondary school teachers and a good level of sense of job performance. There is no statistically significant difference in the level of psychological comfort according to gender. There is a significant difference in psychological comfort according to the variable of the length of service in
... Show MoreAim: To find any association between specific ABO blood groups and FUT2 secretory status and COVID-19 in a sample of Iraqi dentists. Materials and Methods: For each participant, a questionnaire including demography, COVID-19 status, blood grouping, and RH factor, with chemo-sensitive symptoms was recorded. The saliva samples were collected and DNA was extracted from leukocytes. Sequencing of molecular detection of the FUT2 gene by real-time PCR and the data was done, whilst drawing the phylogenetic tree. Results: Out of 133, most of the dentists were female 61%, most were just under 35 years of age. The most participants in this study were predominantly with blood group O (40%), followed by B, A, and AB, with (90%) of them were RH+.
... Show MoreThe research discussed the role of interrelationships between the product attributes and the individual identity of the brand and the user, starting from reviewing the identity concepts in the general design propositions and the identity from the industrial design perspective, and highlighting the role of the attributes in identifying the individual identity of the product, which would enable the user to adopt them to be representative of his identity, starting from identifying the importance of the identity being characterized by three major elements: innovating products in the user's viewpoint, viewing the user's environment, the methodology of the design language, and identifying the identity attributes in the industrial product start
... Show MoreThe present study involves experimental analysis of the modified Closed Wet Cooling Tower (CWCT) based on first and second law of thermodynamics, to gain a deeper knowledge in this important field of engineering in Iraq. For this purpose, a prototype of CWCT optimized by added packing under a heat exchanger was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the towers thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of air measured at intermediate points of the heat exchanger and packing. Exergy of water and air were calculated by applying the exergy
... Show MoreThis paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreThe dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on leather
... Show MoreVision loss happens due to diabetic retinopathy (DR) in severe stages. Thus, an automatic detection method applied to diagnose DR in an earlier phase may help medical doctors to make better decisions. DR is considered one of the main risks, leading to blindness. Computer-Aided Diagnosis systems play an essential role in detecting features in fundus images. Fundus images may include blood vessels, exudates, micro-aneurysm, hemorrhages, and neovascularization. In this paper, our model combines automatic detection for the diabetic retinopathy classification with localization methods depending on weakly-supervised learning. The model has four stages; in stage one, various preprocessing techniques are app
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More