Rapid breakdown anodization (RBA) process was used to fabricate TiO2 sensor to measure pressure and humidity and sense gases at room temperature. This chemical process transformed Ti to its oxide (TiO2) as a powder with amorphous phase as X ray diffraction (XRD) technique confirmed. This oxide consisted from semi spherical nanoparticles and titania nanotubes (TNTs) as Scanning electron microscope (SEM) technique showed. TiO2 powder was deposited on Ti substrates by using electrophoretic deposition (EPD) method. Average pressure sensitivity was 0.34 MΩ/bar and hysteresis area was 1.4 MΩ .bar. Resistance of TiO2 decreased exponentially with the increasing of relative
... Show MoreAbstract: This research was performed to study the effect of some amino acids and vitamins on the growth of bacteria Staphylococcus aureas and its sensitivity against UV light. The results showed low inhibition in bacterial growth because amino acids repairs the damges caused by UV light. Besides the effect of two groups of antibiotics (β-lactame and tetracycline) on the growth of S. aureus and the possible interference of amino acids and vitamins in the activity of the antibiotics against this bacteria in the presence of UV light were studied. The result show increase in the sensitivity towards these antibiotics and provided protection against the antibiotics.
significant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.
Because of the tremendous changes in the business environment and significant growth in living standards, increased demand for services in general and about the realized practitioners in the field of service that traditional marketing strategies and models administrative based solutions to mono as the price alone does not lead to the desired outcomes with customers and even organizations as it does not apply always for the manufacture of their services unique . therefore , the need to learn marketing service order and a clear and critical to avoid failures in service and the marketing document to knowledge would avoid the organization that the failure in the delivery of service and enhances the desired response to fix it in a tim
... Show MoreIn this research , we tried to identify the meaning empowerment in the development literatures , and inquire the most enabling prominent actions to promote women , as we considered the most important international conferences that take up the subject of women's empowerment .
In the context of research on the subject of empowering women to occupy leadership positions , we tried to diagnose the target of the empowerment , and we clarify the correlation between human development and empowerment of women , also the research touched on the decision (1325) issued by the United Nations , which includes provisions regarding the importance of women participation at all levels in the process of decision-making .
We realized that there are so
In this research the subject of human ability to change, as it is proven in the Koran , which is proof of the argument against the ability of human change , whether the change in the positive or negative direction .
Here the limits of the research are limited to a study of analysis of human ability to change and this establishes the important of knowing that man has the ability while in the wrong way to change the path to the right path which Gifts and guidance .
The search required three demands and conclusion
- The first required :- is to try the idolaters to take out believers by right .
- The second required :- is to change what is inside the soul as a reason to enter blessings on man .
- The third required :- is good
Due to the difficulties that Iraqi students face when writing in the English language, this preliminary study aimed to improve students' writing skills by using online platforms remotely. Sixty first-year students from Al-Furat Al–Awsat Technical University participated in this study. Through these platforms, the researchers relied on stimuli, such as images, icons, and short titles to allow for deeper and more accurate participations. Data were collected through corrections, observations, and feedback from the researchers and peers. In addition, two pre and post-tests were conducted. The quantitative data were analysed by SPSS statistical Editor, whereas the qualitative data were analyzed using the Piot table, an Excel sheet. The resu
... Show MoreIntroduction. Tangential gunshot wounds (TGSW) to the head is the high-velocity bullet that does not penetrate the cranium but passes through the tissue adjoining the cranial cavity, creating a “gutter” wound and indirectly causing cerebral injury. This article presents a reporting case of TGSW to the head, discusses the mechanism underlying this traumatic injury and the possible complications resulting from it, and reviews of literature. Case description. A thirteen-year-old schoolboy was admitted to the emergency department (ER) of the neurosurgery teaching hospital in Baghdad, Iraq, with a tangential gunshot to the head of an unknown source during civilian protests in Baghdad. In addition to a seizure attack in the ER, his
... Show MoreIn the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack. SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input such as form and then include this input in database requests, typically SQL statements in a way that was not intende
... Show More