In this paper Alx Ga1-x As:H films have been prepared by using new deposition method based on combination of flash- thermal evaporation technique. The thickness of our samples was about 300nm. The Al concentration was altered within the 0 x 40.
The results of X- ray diffraction analysis (XRD) confirmed the amorphous structure of all AlXGa1-x As:H films with x 40 and annealing temperature (Ta)<200°C. the temperature dependence of the DC conductivity GDC with various Al content has been measured for AlXGa1-x As:H films.
We have found that the thermal activation energy Ea depends of Al content and Ta, thus the value of Ea were approximately equal to half the value of optical gap.
Zeolite Y nanoparticles were synthesized by sol - gel method. Dffirent samples using two silica sources were prepared.
Sodium metasilicate (Na2SiO3) (48% silica) and silicic acid silica (H2SiO3) (75% silica) were employed as silica
source and aluminum nitrate (Al(NO3)3.9H2O) was the aluminum source with tetrapropylammonium hydroxide
(TPAOH) as templating agent.
The synihesized-samples were characterized by X-ray diffraction, showed the requirement of diffirent aging time for
complete crystallization to be achieved. Transmission Electronic Microscope (TEM) images, showed the particles were
in the same range of 30 - 75 nm. FT-IR spectroscory, showed the synthesized samples having the zeolite Y crystal
properties. The i
The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe aim of the research is to use the data content analysis technique (DEA) in evaluating the efficiency of the performance of the eight branches of the General Tax Authority, located in Baghdad, represented by Karrada, Karkh parties, Karkh Center, Dora, Bayaa, Kadhimiya, New Baghdad, Rusafa according to the determination of the inputs represented by the number of non-accountable taxpayers and according to the categories professions and commercial business, deduction, transfer of property ownership, real estate and tenders, In addition to determining the outputs according to the checklist that contains nine dimensions to assess the efficiency of the performance of the investigated branches by investing their available resources T
... Show MoreQuantitative real-time Polymerase Chain Reaction (RT-qPCR) has become a valuable molecular technique in biomedical research. The selection of suitable endogenous reference genes is necessary for normalization of target gene expression in RT-qPCR experiments. The aim of this study was to determine the suitability of each 18S rRNA and ACTB as internal control genes for normalization of RT-qPCR data in some human cell lines transfected with small interfering RNA (siRNA). Four cancer cell lines including MCF-7, T47D, MDA-MB-231 and Hela cells along with HEK293 representing an embryonic cell line were depleted of E2F6 using siRNA specific for E2F6 compared to negative control cells, which were transfected with siRNA not specific for any gene. Us
... Show MoreThe city of Karbala is one of the most important holy places for visitors and pilgrims from the Islamic faith, especially through the Arabian visit, when crowds of millions gather to commemorate the martyrdom of Imam Hussein. Offering services and medical treatments during this time is very important, especially when the crowds head to their destination (the holy shrine of Imam Hussein (a.s)). In recent years, the Arba'in visit has witnessed an obvious growth in the number of participants. The biggest challenge is the health risks, and the preventive measures for both organizers and visitors. Researchers identified various challenges and factors to facilitating the Arba'in visit. The purpose of this research is to deal with the religious an
... Show Morethirty adult NewZealand rabbits used in this study, they were divided in to two groups (control and treaded with Helium — Neon laser). A square skin flap done on the medial aspect of the auricle of both sides, a square piece of cartilage incised, pealed out from each auricle and fixed in the site of the other, then the flaps sutured .The site of the operation in the rabbits of the treated group were irradiated using a Helium —Neon laser with (5mw) power for (10 days) began after the operation directly, (3 rabbits) from each group used for collection of specimens for histopathological examination at the weeks (1,2,3,4, & 6) weeks post the operation .The results revealed Early invasion of the matrix with elastic fibers which continue to t
... Show MoreThis paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.