ABSTRACT Porous silicon has been produced in this work by photochemical etching process (PC). The irradiation has been achieved using ordinary light source (150250 W) power and (875 nm) wavelength. The influence of various irradiation times and HF concentration on porosity of PSi material was investigated by depending on gravimetric measurements. The I-V and C-V characteristics for CdS/PSi structure have been investigated in this work too.
This research is concerned with the re-analysis of optical data (the imaginary part of the dielectric function as a function of photon energy E) of a-Si:H films prepared by Jackson et al. and Ferlauto et al. through using nonlinear regression fitting we estimated the optical energy gap and the deviation from the Tauc model by considering the parameter of energy photon-dependence of the momentum matrix element of the p as a free parameter by assuming that density of states distribution to be a square root function. It is observed for films prepared by Jackson et al. that the value of the parameter p for the photon energy range is is close to the value assumed by the Cody model and the optical gap energy is which is also close to the value
... Show Moreتعد مراجعة النظير واحدة من الأســاليب الحديثة فــي مجال الرقابة والتدقيق ونشــأة كأداة لقياس مــدى فاعليــة الرقابــة علــى الجــودة هو لبنة أساسية في إدارة الجودة الشاملة ووسيلة لتحســين أدوات الرقابــة المعمول بها، وللتحقق من مدى الانسجام بين المعايير الدولية للأجهزة العليا للرقابة المالية والمحاسبة والاجراءات المعمول بها من قبل الاجهزة العليا للرقابة وعليه فأن مراجعة النظير أداة تستخدم ف
... Show MoreThe aim of this research is to show the level of banking leadership trends in the importance of organizational confidence and its reflection in the dimensions of the strategic position the research was applied in a bank (Al- Mansour Investment, Business Bay), and the Questionnaire Was adopted as a tool to collect data and information from the number of the sample (15) who are in allocation (Department Manager, Department Manager Department Manager, Division Officer, Unit Officer) and he used the statistical program (spss) to calculate (standard deviation, arithmetic mean, percentages, regression, analysis,F-test coefficient of determination R2, Coefficieent, square Kay and the research reached a number of conclusions, the mos
... Show MoreThe present study attempts to shed light on some biological aspects and characteristics of Piaractus brachypomus, including some biometrics, phenotypic and feeding pattern that characterizes this species. Besides, the study touches upon the body shape and the Otolith. These fish species have recently been seen frozen in the Iraqi local market. The standard length of fish specimens in this study reach 26.55cm it exceeded the specimens of Pacu fish collected from other studies from other countries, As well the specimens weight was 632gm it exceeded other studies mentioned in this manuscript. As the irregularity in the distribution of teeth rows, especially in the lower jaw was clear in our specimens. The average weight of some skull b
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThis study deals with the time property in the cinema through two films: (The Knife) directed by Khalid Hamada and (The Deceived) directed by Tawfiq Saleh. These two films were excerpted by the cinema from two novels of the Palestinian writer Ghassan Kanafani, the first is from the novel (What is Left for You) and the second is from the novel (Men in the Sun). If the Palestinian novel has imposed its presence on the Arab creative scene through a group of novelists who took it upon themselves to communicate their cause to the world, the Palestinian cinema has been far from being a purely Palestinian, because many of the cinematic works have been provided by Arab countries on the issue, while this cinema is still seeking
... Show Moreم. د. ولاء طارق حميد, Al. Qadisiya journal for the Sciences of Physical Education, 2017