A numerical computation for determination transmission coefficient and resonant tunneling energies of multibarriers heterostructure has been investigated. Also, we have considered GaN/Al0.3Ga0.7N superlattice system to estimate the probability of resonance at specific energy values, which are less than the potential barrier height. The transmission coefficient is determined by using the transfer matrix method and accordingly the resonant energies are obtained from the T(E) relation. The effects of both well width and number of barriers (N) are observed and discussed. The numbers of resonant tunneling peaks are generally increasing and they become sharper with the increasing of N. The resonant tunneling levels are shifted inside the well by increasing the well width and vice versa. These features and the transmission coefficient as a function of incident energetic particles play an important role in fabrication of high speed devices and a good factor for determination the peak-to-valley ratio of resonant tunneling devices respectively.
This paper presents experimental investigations on buried Glass Reinforced Plastic (GRP) pipes with a diameter of 1400 mm. The tested pipes were buried in dense, gravelly sand and subjected to traffic loads to study the effects of backfill cover on pipe deflection. The experimental program included tests on three GRP pipes with backfill covers of 100 cm, 75 cm, and 50 cm. The maximum traffic loads applied to the pipe–soil system corresponded to Iraqi Truck Type 3 (AASHTO H type). Vertical deflections of the pipes were monitored during the application of these loads. The experimental results showed that, as the backfill cover increased, the maximum vertical deflection of the pipe decreased. Deflection reductions were 38.0% and 33.3
... Show MoreHuman witnessed over the centuries many of the important issues faced by the international community was centered on human rights in general and the persecution of refugees, especially according to many forms may be directly or indirectly leaves behind economic crises, social and humanitarian push world countries to rethink the mechanisms and the feasibility of developing agreements and laws and the role of international and regional organizations to protect peoplerefugeestatus.
The current research aims to know the complementary use of the paper book and the digital book by defining the paper book and the digital book and knowing the methods and methods of obtaining each of them and indicating the extent of their use and for what purpose and knowing the difficulties that researchers face in using each of them and which is better using the paper book or the digital book in preparing research Studies and for no reason. The research relied on the descriptive approach and the questionnaire as a tool for data collection, and it was distributed to professors and students of Iraqi universities. The research sample reached (219) individuals and reached a set of results, the most important of which are: Preference for the
... Show MoreIn the postmodern era, the graphic design styles showed a new visualization method when the graphic designers had changed the traditional conditions by using design elements with new technics for photos, collage and comics illustration. The researcher assumes that the graphic design styles were affected by the art's movement at that period throw the same perspective of view for the concept presented in the art pieces and their entire message. Therefore, the researcher chooses field was the period of 1945-1970 in the USA for the (pop-art and conceptual-art) and explored the main visual effects that expressed the visual dialogue and compared them with the most common design styles ant the same period and location, the results of selected e
... Show MoreThis research shows the issues of Ibn Hisham's illusion in its leadership of the grammarians; As Ibn Hisham attributed - during his presentation of grammatical issues - grammatical opinions to a number of grammarians claiming them in them, and after referring to the main concepts that pertain to those grammarians, we found that Ibn Hisham had delusional in those allegations, in addition to that clarifying the terms illusion and claim in the two circles of language And the terminology, and perhaps the most prominent result in this research is that he worked to investigate these issues by referring to their original sources, with an explanation of the illusions of Ibn Hisham in his attribution to these issues.
The research aims to examine the effect of KUD strategy on acquiring the grammatical concepts among intermediate school students. To achieve the research objective, the researcher adopted the null hypothesis in which there is no statistically significant difference at the level (0.05) between the average scores of students of the experimental group who study grammar base on the KUD strategy and the average scores of the control group who study the grammar through the traditional way of acquiring grammatical concepts. In a random manner, the researcher selected the research sample from one of Baghdad’s education schools in al Rusafa / 2, as the total number of students of the two groups reached (67) students. They were divided into (33)
... Show MoreIn the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More