This contribution investigates the impact of adding transition metal of Ti to CeOy samples at various concentrations referring to 0, 15.84, 24.46, 34.46, 36.23, 38.46, 45.38% and pure TiOy, correspondingly. The samples were fabricated by the magnetron sputtering technique. X-ray diffraction (XRD) configurations demonstrate the presence of α-Ce2O3 and Ce2O3 phases with increased Ti contents in the systems. X-ray photoelectron spectroscopy (XPS) experimentation confirms the purity of the S1-sample (CeO2) and the purity of the S8-sample (TiO2). Further XPS analysis reveals that Ti incorporation in the doped systems functions as a reducing agent because of the existence of α-Ce2O3 and Ce2O3 phases. Moreover, based on UV–vis spectroscopy results, the studied samples exhibit indirect optical energy band-gaps reduced from 2.6 to 2.35 eV with the increase of Ti concentrations of 0–45.38% in (S1-S7), respectively. In reference to bandgap 2.35 eV, a slight rise in band gaps was detected for S3 sample. However, an observable increase in the band gap of 2.9 eV occurred for S8 (pure TiO2). Optical analysis of the calculated energy loss parameters demonstrates that all the studied samples reveal small amounts of energy loss. Our results suggest that the improved optical properties of Ti-doped CeOy films could serve for various optical applications.
There were many ideas and opinions on the linkage between growth and economic reform in both developed and developing countries. The relationship is, of course, existed. Therefore, this research comes to analyses it in the Iraqi economy. This study is based on a hypothesis that the economic reformation in Iraq leads to lag level of growth with the of high rates of inflation. However, the study is designed to be included five sections. It found a positive relationship between the economic reformation and slowing of economic growth, in which the specified hypothesis is not fit to the economic reality in Iraq after 2003 &
... Show MorePurpose: The research seeks to develop the implications of intellectual human capital, and social capital in business organizations, and will be accomplished on three levels, the first level (the level of description) to identify, diagnose and display content philosophical Strategic Human Resource Management at the thought of modern administrative represented by human capital and Ras social capital. The second level (level of analysis) and the analysis of the extent of the impact of alignment between human capital, and social capital in the organizational strength of the organizations. The third level (Level predict) the formulation of a plan to strengthen the organizational strength in business organizations and to develop speci
... Show MoreAbstract The research investigates in detail the fascinating story of its title character, which may work as an allegory for Africa itself in its past. Ama Ata Aidoo is miscellaneous writers who wrote in different literary genre like drama , short stories novel and , poetry and criticism . She is also an active feminist. Aidoo is against the colonial practice and its influence on African minds. Aidoo's play Anowa confronts painful issues in Africa's past, mostly those of the slave trade. She goes further to tackle issues of patriarchal domination and African feminism, like the relationships between individuals and society, women and motherhood, men and women, husbands and wives, mothers and daughters, and above all the future invasion
... Show MoreIndividual cannot live alone due to to his need for others to facilitate His supplies for living, thus social affiliation is considered one of the most important psychological, social needs in individuals life through his willing to affiliate to others whether they were friends ,family, colleague , or even home to reach some degree of psychological stability.
Affiliation is a tool to search for Satiate through living with group from the same type or comply for group or to be compatible with them or even to be adherent and accept what the group agreed about of criterion.
 
... Show MoreNumeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a
... Show MoreSoil defilement with "raw petroleum" is a standout amongst the most across the board and genuine ecological issues going up against both the industrialized and oil country like Iraq. Along these lines, the impact of "raw petroleum" on soil contamination is one of most critical subjects that review these days. The present examination expects to research "unrefined oil"effectson the mechanical and physical properties of clayey soils. The dirt examples were acquired from Al-Doura area in Baghdad city and arranged by the "Brought together Soil Grouping Framework (USCS)" as silty mud of low pliancy (CL). Research center tests were done on contaminated and unpolluted soil tests with same thickness. The dirtied tests are set up by blending
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More