Since the nineties of the last century, Iraqi youth have been exposed to Mexican soap operas dubbed into classical Arabic, and the stories and ideas presented by these series were almost new to all the minds of the youth at that time, a culture completely different from the culture we have of social relations, and since the number of episodes was more than Of the 100 episodes, exposure to these series has left young people confused by the addiction to all their ideas and stories. They differ from the foreign films (mostly American) that we used to watch, and they only take two hours (at most). These films contain diverse stories and may be forgotten. Memory includes events and characters in their entirety at times, and you may remember th
... Show MoreObjective: Evaluation of the poly ether keton keton polymer (PEKK) coating material on the commercial pure titanium disks (CP Ti) with or without laser surface structuring. Design: In vitro experimental study of PEKK polymer coated material on the CP Ti disks with or without laser surface structuring. Materials and methods: coating the surface of the commercial pure titanium (CP Ti) disks with PEKK polymer was performed via using frictional mode CO2 laser, then the samples disks analyzed by using FESEM. Results: the FESEM reveal good adherence and distribution of the PEKK coated material over the CP Ti substrate by using the frictional mode CO2 laser at 2 watt and 6 ms pulse duration. Conclusion: the frictional mode CO2 laser considered an
... Show MoreSpray pyrolysis technique (SPT) is employed to synthesize cadmium oxide nanostructure with 3% and 5% Cobalt concentrations. Films are deposited on a glass substrate at 350 ᵒC with 150 nm thickness. The XRD analysis revealed a polycrystalline nature with cubic structure and (111) preferred orientation. Structural parameters represent lattice spacing, crystallite size, lattice parameter and dislocation density. Homogeneous surfaces and regular distribution of atoms were showed by atomic force microscope (AFM) with 1.03 nm average roughness and 1.22 nm root mean square roughness. Optical properties illustrated a high transmittance more than 85% in the range of visible spectrum and decreased with Co concentration increasing. The absorption
... Show MoreZinc sulfide (ZnS) thin films were deposited on glass substrates using pulsed laser deposition technique. The laser used is the Q-switched Nd: YAG laser with 1064nm wavelength and 1Hz pulse repetition rate and varying laser energy 700mJ-1000mJ with 25 pulse. The substrate temperature was kept constant at 100°C. The structural, morphological and optical properties of ZnS thin films were characterized with X-ray diffraction (XRD), scanning electron microscopy (SEM), atomic force microscope (AFM) and UV-VIS spectrophotometer.
As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreIn this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa
... Show MoreCost is the essence of any production process for it is one of the requirements for the continuity of activities so as to increase the profitability of the economic unit and to support the competitive situation in the market. Therefore, there should be an overall control to reduce the cost without compromising the product quality; to achieve this, the management should have detailed credible and reliable information about the cost to be measured, collected, understood and to analyze the causes for the spread of deviations and obstacles the management faces, and to search for the factors that trigger the emergence of these deviations and obstacles
The success of the company's strategy depends to a large extent on the success of its functional areas, the marketing Mix makes the company more able to monitor the external environment and the rapid changes related to competitors and customers, as well as the innovation contributes to meet the needs of customers and the requirements of competition and try to find solutions to various problems in Innovation ways, and thus integrated marketing and Innovation efforts in the company towards the design of competitive services to meet the requirements of customers and competition. The research aims to determine how marketing Mix and innovation to design unique and distinct services compared to the competitors, through exporator a sample of en
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show More