Preferred Language
Articles
/
MBbDmYcBVTCNdQwCyVh1
Bilayer MSe<sub>2</sub> (M = Zr, Hf, Mo, W) performance as a hopeful thermoelectric materials
...Show More Authors
Abstract<p>Significant advancements in nanoscale material efficiency optimization have made it feasible to substantially adjust the thermoelectric transport characteristics of materials. Motivated by the prediction and enhanced understanding of the behavior of two-dimensional (2D) bilayers (BL) of zirconium diselenide (ZrSe<sub>2</sub>), hafnium diselenide (HfSe<sub>2</sub>), molybdenum diselenide (MoSe<sub>2</sub>), and tungsten diselenide (WSe<sub>2</sub>), we investigated the thermoelectric transport properties using information generated from experimental measurements to provide inputs to work with the functions of these materials and to determine the critical factor in the trade-off between thermoelectric materials. Based on the Boltzmann transport equation (BTE) and Barden-Shockley deformation potential (DP) theory, we carried out a series of investigative calculations related to the thermoelectric properties and characterization of these materials. The calculated dimensionless figure of merit (ZT) values of 2DBL-MSe<sub>2</sub> (M = Zr, Hf, Mo, W) at room temperature were 3.007, 3.611, 1.287, and 1.353, respectively, with convenient electronic densities. In addition, the power factor is not critical in the trade-off between thermoelectric materials but it can indicate a good thermoelectric performance. Thus, the overall thermal conductivity and power factor must be considered to determine the preference of thermoelectric materials.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Speech Acts Through Ages - A Comprative Study between Traditional and Modren Approches
...Show More Authors

This study has been developed axes of the search, including: Search (deliberative) language and idiomatically, and Description Language (b social phenomenon), and the definition of the theory of (acts of speech), and discussed the problem of the conflict between tradition and innovation, as defined objectively have a target aimed at reviving the deliberative thought when Arab scholars , and the balance between the actual done Arab and Western rhetoric, but Meet in intellectual necessity, a sober reading that preserve the Arab language prestige, and its position in the light of the growing tongue Sciences, as long as we have inherited minds unique, and heritage huge able to consolidate the Arab theory lingual in linguistics.

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
A Pragmatic Study of Narcissism in the American Movie Big Eyes (2014)
...Show More Authors

Narcissism is a complicated phenomenon that can be reflected in the narcissist’s language. Investigating narcissism in terms of linguistics, and pragmatics in particular, does not seem to have been given its due attention, as this study reveals. Thus, this study is an endeavor to discover how narcissism is reflected in the American movie Big Eyes (2014). It is known for introducing narcissistic behaviors. This paper aims to identify the types, motivations, and pragmatic manifestations of narcissism in the selected movie. Three pragmatic theories are chosen to scrutinize narcissism in the data: Searle’s speech acts (1969), Grice’s maxims breaching (1975), and Culppeper’s impoliteness (1996). To cope with the nature of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 02 2018
Journal Name
Al-nahrain Journal For Engineering Sciences (njes)
Output Feedback Adaptive Sliding Mode Control Design for a Plate Heat Exchanger
...Show More Authors

The heat exchanger is a device used to transfer heat energy between two fluids, hot and cold. In this work, an output feedback adaptive sliding mode controller is designed to control the temperature of the outlet cold water for plate heat exchanger. The measurement of the outlet cold temperature is the only information required. Hence, a sliding mode differentiator was designed to estimate the time derivative of outlet hot water temperature, which it is needed for constructing a sliding variable. The discontinuous gain value of the sliding mode controller is adapted according to a certain adaptation law. Two constraints which imposed on the volumetric flow rate of outlet cold (control input) were considered within the rules of the proposed

... Show More
Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
Applied Soft Computing
A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks
...Show More Authors

Scopus (246)
Crossref (202)
Scopus Clarivate Crossref
Publication Date
Mon Jan 15 2018
Journal Name
International Journal Of Science And Research (ijsr)
Production a Digital Map with the Aid of Total Station and (GIS)
...Show More Authors

Geographic information system (GIS) is utilized in a variety of tasks such as, resource management, urban planning, emergency planning in case of accident, and rapid response etc. The aim of this study is to produce a digital map with the aid of GIS and a survey data. A survey data is conducted with Total Station technique on sanitary planning positions. The campus of Baghdad University is chosen to test the execution and accuracy of the results for sewer manholes locations. During the field survey, Total Station (Nikon Nivo) is used to identify the 3-D coordinates for each location. Finally, Geographical Information System (GIS) are utilized to present the digital map of the network sewer pipe line to the end users. Although Geographic Inf

... Show More
Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Applications And Applied Mathematics: An International Journal (aam)
Stability and Bifurcation of a Cholera Epidemic Model with Saturated Recovery Rate
...Show More Authors

In this paper, a Cholera epidemic model is proposed and studied analytically as well as numerically. It is assumed that the disease is transmitted by contact with Vibrio cholerae and infected person according to dose-response function. However, the saturated treatment function is used to describe the recovery process. Moreover, the vaccine against the disease is assumed to be utterly ineffective. The existence, uniqueness and boundedness of the solution of the proposed model are discussed. All possible equilibrium points and the basic reproduction number are determined. The local stability and persistence conditions are established. Lyapunov method and the second additive compound matrix are used to study the global stability of the system.

... Show More
View Publication
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
studies of human interferon a B and Y activities on diffrent cell
...Show More Authors

Human interferon as is the case in all kinds of interferon has complex effects but all share their impact on preventing the proliferation of viruses and preventing or reducing human Alantervjørn conversion occurs if the cell is in preventing the growth of the virus when interferon Balnmstqubl connects

View Publication Preview PDF
Publication Date
Wed Feb 06 2019
Journal Name
Journal Of The College Of Education For Women
The Effect use of the Internet in Academic Libraries A Case Study
...Show More Authors

The aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.

View Publication Preview PDF