Photodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction
A new ligand [N-(3-acetylphenylcarbamothioyl)-4-chlorobenzamide] (CAD) was synthesized by reaction of 4-Chlorobenzoyl isothiocyanate with 3-amino acetophenone, The ligand was characterized by elemental micro analysis C.H.N. S., FT-IR, UV-Vis and 1H,13C- NMR spectra, some transition metals complexes of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption, From obtained results the molecular formula of all prepared complexes were [M(CAD)2(H2O)2]Cl2 (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg),the proposed geometrical structure for all complexes were octahedral
This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.
The key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.
The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty
Asphaltenes are a solubility class described as a component of crude oil with undesired characteristics. In this study, Sharqy Baghdad heavy oil upgrading was achieved utilizing the solvent deasphalting approach as asphaltenes are insoluble in paraffinic solvents; they may be removed from heavy crude oil by adding N-Hexane as a solvent to create deasphalted oil (DAO)of higher quality. This method is known as Solvent De-asphalting (SDA). Different effects have been assessed for the SDA process, such as solvent to oil ratio (4-16/1 ml/g), the extraction temperature (23 ºC) room temperature and (68 ºC) reflux temperature at (0.5 h mixing time with 400 rpm mixing speed). The best solvent deasphalting results were obtained at room temp
... Show MoreIn this paper, we characterize normal composition operators induced by holomorphic self-map , when and .Moreover, we study other related classes of operators, and then we generalize these results to polynomials of degree n.
In this paper, we will introduce the concept of interval value fuzzy n-fold KU-ideal in KU-algebras, which is a generalization of interval value fuzzy KU-ideal of KU-algebras and we will obtain few properties that is similar to the properties of interval value fuzzy KU-ideal in KU-algebras, see [8]. Also, we construct some algorithms for folding theory applied to KU-ideals in KU-algebras.
Baghdad city has been faced numerous issues related to freshwater environment deteriorations due to many reasons, mainly was the discharge of wastewater without adequate treatment. Al-Rustamiya Wastewater Treatment Plant (WWTP) have been constructed among many plants in Baghdad city to reduce the amount of wastewater discharged into natural environment and its subsequent adverse effects. This study was conducted to evaluate the performance of the plant which consist of a conventional activated sludge (CAS) and sequencing batch reactors (SBR) systems as secondary treatment units and its ability to meet Iraqi specifications. A reliability level determination and analysis also were conducted to find the plant's stability an
... Show MoreSecurity concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More