Cu (In, Ga) Se2 (CIGS) nano ink were synthesized from molecular precursors of CuCl, In Cl3, GaCl3 and Se metal heated to 240 °C for 1 hour in N2-atmosphere to form CIGS nanocrystal ink, Thin films were deposited onto Au/soda-lime glass (SLG) substrates. This work focused on CIGS nanocrystals, including their synthesis and application as the active light absorber layer in photovoltaic devices (PVs). This approach, using spin-coating deposition of the CIGS light absorber layers (75 mg/ml and 150 nm thickness), without high temperature selenization, has enabled up to 1.398 % power conversion efficiency under AM 1.5 solar illumination. X-ray diffraction (XRD) studies show that the structural formation of CIGS chalcopyrite structure. The morphology and composition of CIGS were studied using scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDX), respectively.
There are varieties of reasons lead for drilling horizontal wells rather than verticals. Increasing the recovery of oil, especially from thin or tight reservoir permeability is the most important parameter. East Baghdad oil field considered as a giant field with approximately more than 1billion barrel of a proved reserves accompanying recently to low production rate problems in many of the existing wells. It is important to say that presence of of horizontal wells in East Baghdad field especially by converting some of already drilled wells by re-entry drilling horizontal sections may provide one of best solutions for the primary development stage in East Baghdad field which may be followed by drilling new horizont
... Show MoreMany organizations today are interesting to implementing lean manufacturing principles that should enable them to eliminating the wastes to reducing a manufacturing lead time. This paper concentrates on increasing the competitive level of the company in globalization markets and improving of the productivity by reducing the manufacturing lead time. This will be by using the main tool of lean manufacturing which is value stream mapping (VSM) to identifying all the activities of manufacturing process (value and non-value added activities) to reducing elimination of wastes (non-value added activities) by converting a manufacturing system to pull instead of push by applying some of pull system strategies a
... Show MoreThe method of powder technology has been utilized for fabrication of ceramic filters. Ceramic filters with interconnected porosity have been achieved via mixes of ceramic powders with addition of glass powders, therefore, interparticle glassy phase is introduced and act as a weld between the crystalline grains in a high porosity microstructure. Tow types of ceramic filters have been produced, the first with high silica content and the other is with high alumina content. Both physical and mechanical properties has been performed and discussed
Kinetic and mechanism studies of the oxidation of oxalic acid by Cerium sulphate have been carried out in acid medium sulphuric acid. The uv- vis. Spectrophotometric technique was used to follow up the reaction and the selected wavelength to be followed was 320 nm. The kinetic study showed that the order of reaction is first order in Ce(IV) and fractional in oxalic acid. The effect of using different concentration of sulphuric acid on the rate of the reaction has been studied a and it was found that the rate decreased with increasing the acid concentration. Classical organic tests was used to identify the product of the oxidation reaction, the product was just bubbles of CO2.
The need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w
... Show MoreHair is an excellent indicator for abnormal concentration of toxic elements , In this study a random samples from girls hair of 12 cm long were irradiated by a flux of neutrons (4x10^ n/ cm^.s) obtained from an Am-Be neutron source of 5-Ci activitity . The y-ray activity measurements were carried out by using a " 5x5 " well- type Nal (Tl) detector. The study indicates clearly that the maximum concentration of elements was at about 7 cm hair length.
The Ash'aris and their position on faith, An Ideological Study
Omed AbdulQader rasool
College of Islamic Sciences/Salahaddin University-Erbil
Abstract
The concept of faith is very complex, and there are a lot of talk about it among the major Islamic groups such as the Kharijites, the Mu'tazila, the Jahmiyya and others, because of its great importance, and the worldly and eschatological effects it entails according to the elements of faith such as recognition, ratification and action.
The researcher chose one sect, which is the
... Show MoreIn this paper, a discussion of the principles of stereoscopy is presented, and the phases
of 3D image production of which is based on the Waterfall model. Also, the results are based
on one of the 3D technology which is Anaglyph and it's known to be of two colors (red and
cyan).
A 3D anaglyph image and visualization technologies will appear as a threedimensional
by using a classes (red/cyan) as considered part of other technologies used and
implemented for production of 3D videos (movies). And by using model to produce a
software to process anaglyph video, comes very important; for that, our proposed work is
implemented an anaglyph in Waterfall model to produced a 3D image which extracted from a
video.
With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show More