The purposes of this study are to measure masculine's identification among secondary school students, and to examine the significant differences among secondary school students in respect of students age (16-18) year. The researcher has prepared a questionnaire comprised (25) item to measure masculine identification among students: this scale was applied on (100) student who were selected as a sample from four different school at al-rusafa side in Baghdad. The scale then modified to (23) item to be more consistent. The results revealed that there were no significant differences among students based on the variable of age, and the mean of masculine identification showed a high level than the hypothesized mean.
Many risks have adverse consequences for construction projects’ objectives such as quality, schedule, and cost. As engineering procurement construction (EPC) contracts gradually become one of the most common types used in implementing major large-scale construction projects, identifying common risk types and analyzing their root causes is important for developing measures to decrease and eliminate future risks in these types of contracts. The information about the main causes of risks was collected
The most common form of childhood cancer is leukemia, Calculation for more than one third of all childhood cancers among those ages 1 day – 14 years. The diseases of leukemia are worldwide, it occurred in both genders from male and females and in all age. A total of 80 different samples of patient children were collected from the central teaching hospital of pediatric in Baghdad. Obtained during the period from 1st Sept. 2019 till the 31 th of Aug. 2020. Each isolates identification by using Vitek 2. Isolated organism in leukemic children show 18 (22.5 %) gram positive and 62 (77.5 %) gram negative from the total sample 80 (100.0 %). The percent of male is 45 more than female which represents 35 in most age groups between age (1 d
... Show MoreThe structural, optical and photoelectrical properties of fabricated diffusion heterojunction (HJ) solar cell, from n-type c-Si wafer of [400] direction with Boron, has been studied. AgAl alloys was used because of its properties that affect as a good connection materials. TiO2 has been used as a reflecting layer to increase the absorption radiation. The HJ has direct allowed energy gap equal to 3.1 eV. The c-Si/B HJ solar cell yielded has an active area conversion efficiency of 16.4% with an open circuit voltage of (Voc) 0.592V, short circuit current (Isc) of 2.042mA, fill factor (F.F) of 0.682 and % =10.54.
Abstract. Silver, Indium Selenium thin film with a thickness (5001±30) nm, deposited by thermal evaporation methods at RT and annealing3temperature (Ta=400, 500 and 600) K on a substrate of glass to study structural and optical properties of thin films and on p-Si wafer to fabricate the AgInSe2/p-Si heterojunction solar cell. XRD analysis shows that the AgInSe2 (AIS) deposited film at RT and annealing3temperature (Ta=400, 500 and 600) K have polycrystalline structure. The average grain size has been estimated from AFM images. The energy gap was estimated from the optical transmittance using a spectrometer type (UV.-Visible 1800 spectra photometer). From I-V characterization , the photovoltaic parameters such as, open-circuit voltage, short
... Show MoreThe Turks used the Ottoman Turkish language from the thirteenth century to the twentieth century. During this period and under the influence of Islamic civilization, a large number of words and structures were used from the Arabic and Persian languages, Therefore, many Arabic grammatical structures were used in the Ottoman Turkish language, such as the definite article simply because it was widely used.
The paper is concerned with the use of the Arabic definite article in the Ottoman Turkish language, and the aim of this contrastive study is to find out the similarities and differences between the two languages in terms of meaning and structure. Since linguistic studies depend on the practical side or applied approach, two
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreAudio security is an important aspect in various areas of communication. This paper deals with audio encryption as many of the data communication depends on audio data. In this paper, a new proposal of audio encryption system has been introduced. The system can be divided into two phases, the first phase focuses on generating a high-quality Pseudo Random Number generator (PRNGs) using elementary, periodic and hybrid rules of cellular automata (CA). The system suggests a new combination of CA rules in an endeavor to provide high randomness and to improve the strength of the proposed cryptosystem. Whereas the second phase produces the Enhanced Rivest Cipher 5 (ERC5) algorithm which employs the generated Random Number Sequence (RNS) i
... Show More