The electrical performance of bottom-gate/top source-drain contact for p-channel organic field-effect transistors (OFETs) using poly(3-hexylthiophene) (P3HT) as an active semiconductor layer with two different gate dielectric materials, Polyvinylpyrrolidone (PVP) and Hafnium oxide (HfO2), is investigated in this work. The output and transfer characteristics were studied for HfO2, PVP and HfO2/PVP as organic gate insulator layer. Both characteristics show a high drain current at the gate dielectric HfO2/PVP equal to -0.0031A and -0.0015A for output and transfer characteristics respectively, this can be attributed to the increasing of the dielectric capacitance. Transcondactance characteristics also studied for the three organic materials and show the HfO2/PVP gate dielectric have higher value from the single layers which indicate the effect of dielectric capacitance, gm=-0.5517x10-4A/V, -0.9931x10-5A/V, and -0.6511 x10-4A/V respectively.
Various activities taking place within the city of Baghdad have significantly contributed to organic pollution in Rivers Tigris and Diyala. The present study aimed to assess some physical, chemical and biological aspects of six sites on Rivers Tigris and Diyala as they flow through the city of Baghdad. Monthly samples were collected for the period January to December, 2005. Marked differences in the physical and chemical characteristics of water were noted between the two rivers’ sites. Average values during the study period of dissolved oxygen, biochemical oxygen demand, particulate organic matter, nitrate, phosphate and total dissolved solids for Tigris and Diyala were 7.8,4.7; 2.4,10.4; 350.1,921.4;7.8,13.9;1.2,4.8;814,2176 mg / l re
... Show MoreThe present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.
The current study was carried out at the Fields belongs of Horticulture Department, Collage of Agricultural Engineering Science, University of Baghdad, Al-Jadiriyah for the spring season 2016 -2017 to study the effect for inoculation mycorrhizae and folair application with bio stimulators and their interaction in the growth characters of (local okra ptera). A factorial experiment (2 in randomized complete block design (RCBD), the experiment included (12) treatment Distributed in three replicates. The three factors used in this experiment included . The inoculation with control (C) Mycorrhizae ( M ) , Biozyme (B ) ( B1 2cm3.L-1), ( B2 4cm1-.L-1) , Phosphalas (P) (P 2cm3.L-1), ( M + B1), ( M + B2), (P +
... Show MoreA New ligand, N-(2-oxo-1,2- Dihydropyrimidin-4- ylcarbamothioyl) Acetamide (DPA) was prepared by reaction of iso thiosyanate derivative with Cytosine. The ligand has been characterized through elemental analysis, H1 NMR, C13NMR, FT-IR, and UV Visible spectra, such ligand’s transition metal complexes have been characterized through conductivity measurement, FT-IR, UV Visible spectra and magnetic susceptibility, all the complexes of this ligand are solid crystal and molar ratio (2:1) (ligand: metal). The form of molecular for these complexes octa hedral. The general formula [M(DPA)2Cl2], where M+2 = (Mn, Co, Ni, Cu, Zn, Cd, Hg).
EFFECT OF SPRAYING IRON AND ZINC CONCENTRATIONS IN GRAIN AND LEAF CONTENT FOR TWO VARIETIES OF WHEAT CROP
It included the introduction to the research and its importance, as the knee joint is one of the important joints in the human body that are susceptible to injury, and among these injuries is the roughness of the knee that occurs as a result of weakness and imbalance in the work of the quadriceps muscle, so its treatment is through rehabilitation exercises to treat weakness and gain flexibility and strength.Hence the importance of the research by developing rehabilitation exercises with different resistances in the water medium and restoring flexibility and muscular strength for patients with knee roughness for ages from 30-40 years, and the experimental method was used to solve the research problem, and the research sample included (6) of
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show More