In this study lattice parameters, band structure, and optical characteristics of pure and V-doped ZnO are examined by employing (USP) and (GGA) with the assistance of First-principles calculation (FPC) derived from (DFT). The measurements are performed in the supercell geometry that were optimized. GGA+U, the geometrical structures of all models, are utilized to compute the amount of energy after optimizing all parameters in the models. The volume of the doped system grows as the content of the dopant V is increased. Pure and V-doped ZnO are investigated for band structure and energy bandgaps using the Monkhorst–Pack scheme's k-point sampling techniques in the Brillouin zone (G-A-H-K-G-M-L-H). In the presence of high V content, the bandgap energy decreases from 3.331 to 2.043 eV as seen by the band diagram. PDOS diagram was utilized to get the insight of the electronic structure of the atoms and the amount to which all energy bands contribute to a particular orbit of the atoms. As the V content grew, so did the PDOS for all of the states. The manipulation of bandgaps was carried out in a way that narrowing the bandgaps occurs, resulting in a redshift of the absorption spectrum in the IR region. At lower photon energies, the imaginary and real parts dielectric functions have increased. The effectiveness of V atoms on transmissivity especially in the low energy region of the V-doped ZnO perovskite has been verified compared to the other theoretical results.
The current research aims to investigate the counseling services provided to gifted students in the Al-Baha region from their point of view, and to identify the differences in these views according to the students ’gender, educational stages, and the cities in which they study. The descriptive survey approach was followed in its relevance to the research objectives. Likewise, a random sample of gifted elementary, intermediate, and secondary school students was selected by the method of stratified sampling, as the sample reached (175) male and female students. The instrument of the research consisted of the questionnaire of counseling services presented to gifted students from their point of view prepared by researchers. The results sho
... Show MoreThe problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreWhat has reached us from this great heritage left by our scientists book ((masterpiece of honor by knowing the parties)) to the conservative privilege, which Imam Safadi said ((Sheikh of time, and the preservation of the era, and critic of the time, if his son Ibn Makola had a drink and eaten, and make it to him So, after trusting in God, I thought that I should write a paper highlighting the life of this great world and explaining its methodology in this useful book in which Imam Ibn Hajar al-Asqalani said: `` The use of it took place east and west, and the scholars competed in collecting it after. And soon)).
This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show More