Tin Selenide (SnSe) Nano crystalline thin films of thickness 400±20 nm were deposited on glass substrate by thermal evaporation technique at R.T under a vacuum of ∼ 2 × 10− 5 mbar to study the effect of annealing temperatures (as-deposited, 100, 150 and 200) °C on its structural, surface morphology and optical properties. The films structure was characterized using X-ray diffraction (XRD) which showed that all the films have polycrystalline in nature and orthorhombic structure, with the preferred orientation along the (111) plane. These films was synthesized of very fine crystallites size of (14.8-24.5) nm, the effect of annealing temperatures on the cell parameters, crystallite size and dislocation density were observed. Surface morphology of SnSe films as-prepared and annealed are investigated using atomic force microscopy (AFM) analysis, the grain size of these films vary in the rang from (60.12 to 94.70)nm with increasing annealing temperatures. The results obtained from XRD and AFM indicated that these films were Nano crystalline. The optical constants like absorption coefficient, loss factor, quality factor and optical conductivity of these films has been evaluated. The optical properties revealed that SnSe films have optical energy band gap values increase from (1.5-2.2) eV upon annealing temperatures and high value of absorption coefficient hich implies choosing them in solar cell application.
The research aims to determine what a photograph intends to convey as a visual text. Photographs are not captured randomly, especially those of politicians. Each photograph carries a message, even if interpretations of that message vary from person to person. The research adopts a methodology based on semiotic analysis, applying Laurent Gervero's model to analyze a photograph of the Iraqi Prime Minister Mustafa Al-Kadhimi's visit to Fallujah on the anniversary of the victory over ISIS. The photographs in question constitute a visual language built upon a sequence of iconic symbols and signs. These elements coalesce to give rise to an image centered around a particular theme, one designed to convey a precise messag
... Show More
Abstract
The term public budget defects became nowadays a chronic, economical phenomenon, almost all the countries weather advanced or development country suffered from it, despite the different visions to economic schools of a thought to accept or reject the deficit in public budget but the prevailed opinion that is needed to rule the role of the state by reducing the public spending which led to continuous deficits in public budget and the consequent upon increase in government borrowing, increase taxes on income and wealth, thus weakening the in contrive for private investment which contributed to the increase of in flationary stagnation, it became a duty to state covered by the lack of financial sources
... Show MoreThe purpose of this paper is to recognize the impact of database levels on fields of banking service (provision of remittance services and transfer of funds, save financial deposits, provision of personal loans services) in some of Iraqi banks using one-way multivariate analysis of variance. The paper population consisted of (120) employees, then a random stratified sample of (104) employees was taken. A questionnaire paper consists of (24) items were designed in order to analyze by one-Way multivariate analysis of variance (MANOVA) using SPSS.One of the main findings of the current paper is that there is an impact of database on fields of banking service in Iraqi banks (Al Rafidain and Al Rasheed).
The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreThis review delves deep into the intricate relationship between urban planning and flood risk management, tracing its historical trajectory and the evolution of methodologies over time. Traditionally, urban centers prioritized defensive measures, like dikes and levees, with an emphasis on immediate solutions over long-term resilience. These practices, though effective in the short term, often overlooked broader environmental implications and the necessity for holistic planning. However, as urban areas burgeoned and climate change introduced new challenges, there has been a marked shift in approach. Modern urban planning now emphasizes integrated blue-green infrastructure, aiming to harmonize human habitation with water cycles. Resil
... Show MoreThe existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show MoreWeb testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t
... Show MoreThe modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the
... Show More