In this research, the dynamics process of charge transfer from the sensitized D35CPDT dye to tin(iv) oxide( ) or titanium dioxide ( ) semiconductors are carried out by using a quantum model for charge transfer. Different chemical solvents Pyridine, 2-Methoxyethanol. Ethanol, Acetonitrile, and Methanol have been used with both systems as polar media surrounded the systems. The rate for charge transfer from photo-excitation D35CPDTdye and injection into the conduction band of or semiconductors vary from a to for system and from a to for the system, depending on the charge transfer parameters strength coupling, free energy, potential of donor and acceptor in the system. The charge transfer rate in D35CPDT / the system is larger than the rate in D35CPDT/ a system depending on transition energy and driving energy. However, the charge transfer for both systems to be large is associated with large transition energy, decreasing driving energy and potential, and increasing strength coupling with Methanol solvent.
Water level and distribution is very essential in almost all life aspects. Natural and artificial lakes represent a large percentage of these water bodies in Iraq. In this research the changes in water levels are observed by calculating the areas of five different lakes in five different regions and two different marshes in two different regions of the country, in a period of 12 years (2001 - 2012), archived remotely sensed images were used to determine surface areas around lakes and marshes in Iraq for the chosen years . Level of the lakes corresponding to satellite determined surface areas were retrieved from remotely sensed data .These data were collected to give explanations on lake level and surface area fluctuations. It is imp
... Show MoreNatural convection heat transfer is experimentally investigated for laminar air flow in a vertical circular tube by using the boundary condition of constant wall heat flux in the ranges of (RaL) from (1.1*109) to (4.7*109). The experimental set-up was designed for determining the effect of different types of restrictions placed at entry of heated tube in bottom position, on the surface temperature distribution and on the local and average heat transfer coefficients. The apparatus was made with an electrically heated cylinder of a length (900mm) and diameter (30mm). The entry restrictions were included a circular tube of same diameter as the heated cylinder but with lengths of (60cm, 120cm), sharp-edge and
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThe appearance of Mixed Mode Oscillations (MMOs) and chaotic spiking in a Light Emitting Diode (LED) with optoelectronic feedback theoretically and experimentally have been reported. The transition between periodic and chaotic mixed-mode states has been investigated by varying feedback strength. In incoherent semiconductor chaotically spiking attractors with optoelectronic feedback have been observed to be the result of canard phenomena in three-dimensional phase space (incomplete homoclinic scenarios).
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreLanguage ecology is the interactions between the environment and language. Such a discipline, ‘language ecology’ or ‘ecolinguistics has been founded by Einar Haugen’. Accordingly, the study aims at qualitatively reviewing the theoretical and conceptual issues surrounding the subject of language ecology by tracing the roots of language ecology. It further highlights the fundamental inconsistencies between how the concept of ecology is perceived in sociology and biology, and is applied to language, particularly, transposing the main central concepts of bio-ecology, such as relationship/interaction, environment, and organism to human language and theory of ecological-linguistic. The theory wavers among placing the focus
... Show MoreThe concept of employees voice has received a great deal of attention by researchers in the field of organizational behavior and human resources management especially in the last three decades of the twentieth century , this importance has deep ranges limits in terms of its discussion history, so it became a behavioral variable received a great attention and care in managerial and organizational studied and basic pillar in the success and excellence of organizations in maintaining its human resources, the research explain the concept and benefits of paying attention to the voice of employees in business organizations , and the theories interpreted to employees voicing and clearing the motivations behind employees voicing, and dis
... Show More