This contribution investigates structural, electronic, and optical properties of cubic barium titanate (BaTiO3) perovskites using first-principles calculations of density functional theory (DFT). Generalized gradient approximations (GGA) alongside with PW91 functional have been implemented for the exchange–correlation potential. The obtained results display that BaTiO3 exhibits a band gap of 3.21 eV which agrees well with the previously experimental and theoretical literature. Interestingly, our results explore that when replacing Pd atom with Ba and Ti atoms at 0.125 content a clear decrease in the electronic band gap of 1.052 and 1.090 eV located within the visible range of electromagnetic wavelengths (EMW). Optical parameters such as absorption, reflectivity, the real and imaginary components of the dielectric function, Loss function, reflective index, extinction coefficient were calculated. Thus, the current findings reveal that Pd–BaTiO3 is a promising composition to be synthesised experimentally for various optoelectronic applications. The predicted negative formation energies values of the inspected structures are indicating to exothermic formation process of such materials and more interestingly indicating also to the stability and possibility of synthesizing such materials experimentally.
Assessment should give more attention on the learning achievement of the curriculum. Portfolio- based learning assessment (PBLA) is utilized in language learning materials recently .It is assessment tools to test the learners’ learning for instance open-ended problem solving, and creative and critical thinking, imaginative, reflective, have the capacity to apply their information in new issues, and to express oral and composing. This paper aims to discover the impact of utilizing (PBLA) on students’ performance at College of Education (Ibn –Rushd) in English Department the third stage. To fulfill the aim, a sample of the study is (64) EFL students of two groups. The study used a test and an instrument design .The test group ut
... Show MoreSuccessive waves and generations of terrorists attacked the Iraqis in the years following the fall of the regime in Iraq in 2003, after the US invasion of the country under the pretext of weapons of mass destruction. Hence, the Iraqi people enrolled in ongoing war with these armed groups which led to massive casualties due to blasts and missile injuries.
Mechanism of blasts injury can be classified into primary, secondary, tertiary, and quaternary. While bullet injuries can be classified into low and high-energy injuries, the type and severity of the injury will influence the type of management, together with facilities available in
This research aims to identify the means and forms of interactive communication concerning Iraqi topics on the websites of global radio stations, namely Sawa and Monte Carlo. It also seeks to uncover the editorial and artistic interactions related to Iraqi topics on the selected websites chosen as the research sample, comparing them with the editorial interaction within the Iraqi context between the Radio Monte Carlo and Sawa websites.
The research yields several conclusions, including the following:
Iraqis focus their interaction with topics related to Iraq on Facebook for both Radio Monte Carlo and Sawa; Arabs show higher levels of interaction on Twitter with Radio Monte Carlo; Participants on the webs
Abstract.The goal of this article is to find the CEO of Iraqi companies that use strategic planning and determine if they are capable of diagnosing the traits of strategic planning systems that improve these companies' capacity to successfully address crisis-related needs. The capacity of the company to successfully react to crisis needs and demands is enhanced by the use of strategic planning, according to a review of data from 64 enterprises utilizing statistical analysis. Furthermore, top and division or unit managers must be involved and committed for strategic planning to be successful. It also has to be planned with an external orientation and get more than just lip service from top and unit or division level managers. In other words,
... Show MoreCoronavirus: (COVID-19) is a recently discovered viral disease caused by a new strain of coronavirus.
The majority of patients with corona-virus infections will have a mild-moderate respiratory disease that recovers without special care. Most often, the elderly, and others with chronic medical conditions such as asthma, coronary disease, respiratory illness, and malignancy are seriously ill.
COVID-19 is spread mostly by salivary droplets or nasal secretions when an infected person coughs or sneezes.
COVID-19 causes severe acute respiratory illness (SARS-COV-2). The first incidence was recorded in Wuhan, China, in 2019. Since then it spreads leading to a pandemic.
... Show MoreThis study investigates the influence of Strategic Consensus (SC) on Organizational Performance (OP), with Strategic Alignment (SA) serving as a mediating variable, within private academic institutions in Iraq. The research utilized scales developed to measure each variable: SC, OP, and SA, all of which are unidimensional. The sample comprised 131 senior participants, including deans and faculty council members, with questionnaires distributed across three institutions: Dijla University College (35 respondents), Baghdad College of Economic Sciences (31 respondents), and the University of Uruk (65 respondents). Data analysis employed various statistical techniques, including normality testing, confirmatory factor analysis, descriptive statis
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More
The research draws its importance from identifying the methods of profit management in misleading the financial statements, which in turn is reflected in the decisions of the authorities that relied on these reports, and then the models that help in detecting those methods used by the auditors. Risks. The index (margin of excess cash) was used to detect profit management practices on a group of banks listed in the Iraqi market for securities and the number of (23) banks, including (12) commercial bank and (11) Islamic bank and the results were compared to commercial banks with Islamic banks.((The research started from the hypothesis that the use of the (excess cash margin) model in the banking sector reveals the management
... Show MoreThis research tries to reveal how to manage and control the competitive edge for business by building managerial skills in various organizational levels. Our research aims at finding out the nature of various technical, human and in tellectual skills of a new president whose superiority is his competitive ness in the application field at general company for construe tioual industriesand testing the surveyed minor and major changes through a questionnaire to collect information from officials. The sample was composed of (45) director. The data was analyzed using some methods and statistical programs. The most prominent of these is (SPSS) that was used to extract the arithmetic mean, standard deviation, correlation coefficient
... Show More