ABSTRACT Porous silicon has been produced in this work by photochemical etching process (PC). The irradiation has been achieved using ordinary light source (150250 W) power and (875 nm) wavelength. The influence of various irradiation times and HF concentration on porosity of PSi material was investigated by depending on gravimetric measurements. The I-V and C-V characteristics for CdS/PSi structure have been investigated in this work too.
The increase of the scenographic designer role on account of the character of the director in the Iraqi theater constituted a clear phenomenon that has been manifested in many shows, which necessitated a stance on the nature of this relation and delimiting the work space for each one of them inside the theater show. The research focuses on determining the work relation between the directorial vision and the scenographic proposal in the Iraq theater show. The research is divided into four chapters, the first one addressed the methodological framework, where the research problem was stated in the following question (has the scenographic designer been able through his scenographic proposal to remove the director from his position being the
... Show MoreThis work is devoted to define new generalized gamma and beta functions involving the recently suggested seven-parameter Mittag-Leffler function, followed by a review of all related special cases. In addition, necessary investigations are affirmed for the new generalized beta function, including, Mellin transform, differential formulas, integral representations, and essential summation relations. Furthermore, crucial statistical application has been realized for the new generalized beta function.
An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi
... Show MoreIn the midst of political, cultural and economic fast developments accelerated, the world witnessed, with the accompanied big communication revolutions, many shapes of powers. Those developments were followed by changes in relations of international level.
The most prominent among those developments was the international public relations which became equal to official international relations. Moreover, the international public relations became a complementary element dur to the growth of public opinion and its affection on political regime. Such growth of public opinion pushed the politicians to address it; and try to gain its support.
The US was the first realized the importance of international public relations. Th
... Show MoreObjectives: The research aims to highlight the semiotic approach and apply it to a photograph of the Pope's reception at Baghdad International Airport, published on the page of the Media Office of Iraqi Prime Minister Mustafa Al-Kazemi in the Twitter application, in order to study its components, analyze its contents and clarify its implications, as well as approach the image as a political and media act. Methods: The stages of research were accomplished by "investigation, observation, and analysis", and the dismantling of the composition of the photograph, thus revealing the hidden and hidden aspects, relying on the semiotic approach to analysis. Results: The study showed that the ideas and meanings included in the image in form
... Show MoreIodine-doped polythiophene thin films are prepared by aerosol assisted plasma jet polymerization at atmospheric pressure and room temperature. The doping of iodine was carried out in situ by employing iodine crystals in thiophene monomer by weight mixing ratios of 1%, 3%, 5% and 7%. The chemical composition analyses of pure and iodine-doped and heat-treated polythiophene thin films are carried out by FTIR spectroscopy studies. The optical band gaps of the films are evaluated from absorption spectrum studies. Direct transition energy gaps are determined from Tauc plots. The structural changes of polythiophene upon doping and the reduction of optical band gap are explained on the basis of the results obtained from FTIR spectroscopy, UV–V
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show More