In this paper, CdS/Si hetrojunction solar cell has been made by
Chemical Bath Deposition (CBD) of CdS thin film on to
monocrystalline silicon substrate. XRD measurements approved that
CdS film is changing the structure of CdS films from mixed
hexagonal and cubic phase to the hexagonal phase with [101]
predominant orientation. I-V characterization of the hetrojunction
shows good rectification, with high spectral responsivity of 0.41
A/W, quantum efficiency 90%,and specific detectivity 2.9*1014
cmHz1/2W -1 .
The development of a reversed phase high performance liquid chromatography fluorescence method for the determination of the mycotoxins fumonisin B1 and fumonisin B2 by using silica-based monolithic column is described. The samples were first extracted using acetonitrile:water (50:50, v/v) and purified by using a C18 solid phase extraction-based clean-up column. Then, pre-column derivatization for the analyte using ortho-phthaldialdehyde in the presence of 2-mercaptoethanol was carried out. The developed method involved optimization of mobile phase composition using methanol and phosphate buffer, injection volume, temperature and flow rate. The liquid chromatographic separation was performed using a reversed phase Chromolith® RP-18e column
... Show MoreWe are, today, facing a torrent of information, ideas, images and videos due to advances of communication technology and electronic publishing. In addition to the proliferation of social networking sites that allow individuals to use them and participate in their channels without any restrictions limiting their freedom in publishing. Due to these sites many terms have emerged like alternative media which use internet and its various techniques to serve its objectives notably the freedom of expression without restrictions. This research studies the phenomenon of interactive media i.e. alternative media through Facebook along with the freedom that makes it spreading in the society and the relation of individual freedom with social diversit
... Show MoreThe purpose of this research is to investigate the impact of corrosive environment (corrosive ferric chloride of 1, 2, 5, 6% wt. at room temperature), immersion period of (48, 72, 96, 120, 144 hours), and surface roughness on pitting corrosion characteristics and use the data to build an artificial neural network and test its ability to predict the depth and intensity of pitting corrosion in a variety of conditions. Pit density and depth were calculated using a pitting corrosion test on carbon steel (C-4130). Pitting corrosion experimental tests were used to develop artificial neural network (ANN) models for predicting pitting corrosion characteristics. It was found that artificial neural network models were shown to be
... Show MoreComplex and complex psychological processes are complexand are the result of convergence, convergence and interaction between variables, including the subject of mediation or group or individual and psychological processes involved in the variance, including - personal knowledge and emotional tone (Osman, 1987, p. 8 ). An emotionally balanced individual has the ability to endure and delay meeting needs and has the ability to endure as much as possible. Of the emotional balance of the individual is characterized by emotional stability, show some signs of emotional agitation toward any kind of opposition, anger and realism in self-life and discipline (Swift, 1996, p. 44) Van, et al. , Indicates that people with low emotional balance,
... Show MoreThe inverse kinematics of redundant manipulators has infinite solutions by using conventional methods, so that, this work presents applicability of intelligent tool (artificial neural network ANN) for finding one desired solution from these solutions. The inverse analysis and trajectory planning of a three link redundant planar robot have been studied in this work using a proposed dual neural networks model (DNNM), which shows a predictable time decreasing in the training session. The effect of the number of the training sets on the DNNM output and the number of NN layers have been studied. Several trajectories have been implemented using point to point trajectory planning algorithm with DNNM and the result shows good accuracy of the end
... Show More<abstract><p>Many variations of the algebraic Riccati equation (ARE) have been used to study nonlinear system stability in the control domain in great detail. Taking the quaternion nonsymmetric ARE (QNARE) as a generalized version of ARE, the time-varying QNARE (TQNARE) is introduced. This brings us to the main objective of this work: finding the TQNARE solution. The zeroing neural network (ZNN) technique, which has demonstrated a high degree of effectiveness in handling time-varying problems, is used to do this. Specifically, the TQNARE can be solved using the high order ZNN (HZNN) design, which is a member of the family of ZNN models that correlate to hyperpower iterative techniques. As a result, a novel
... Show MoreBackground: The Covid-19 pandemic changed the world; its most important achievement for education was changing the approach from traditional to virtual education. The present study aimed to investigate the role of virtual education networks on mental health of students including personality, beliefs, scientific, and cultural dimensions, in selected countries.Methods: This was an exploratory and applied study. According to the phenomenology strategy, theoretical saturation occurred after 24 semi-structured and targeted qualitative interviews with teachers from Iran, Iraq, Syria and Lebanon, in 2023. Quantitative data was collected through a researcher-made online questionnaire with 423 participants. Teachers with at least a Bachelor’s degr
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More