Pure Cu (CZTSe) and Ag dopant CZTSe (CAZTSe) thin films with Ag content of 0.1 and 0.2 were fabricated on coring glass substrate at R.T with thickness of 800nm by thermal evaporation method. Comparison between the optical characteristics of pure Cu and Ag alloying thin films was done by measuring and analyzing the absorbance and transmittance spectra in the range of (400-1100)nm. Also, the effect of annealing temperature at 373K and 473K on these characteristics was studied. The results indicated that all films had high absorbance and low transmittance in visible region, and the direct bang gap of films decreases with increasing Ag content and annealing temperature. Optical parameters like extinction coefficientrefractive index, and dielectric constants were estimated.
This research investigates new glasses which are best suitable for design of optical systems
working in the infrared region between 1.01 to 2.3μm. This work is extended to Oliva & Gennari
(1995,1998) research in which they found that the best known achromatic pairs are (BAF2-IRG2; SRF2-
IRG3; BAF2-IRG7; CAF2-IRGN6; BAF2-SF56A and BAF2-SF6). Schott will most probably stop the
production of these very little used and commercially uninteresting IRG glasses. In this work equally
good performances can be obtained by coupling BAF2, SRF2&CAF2 with standard glasses from Schott
or Ohara Company. The best new achromatic pairs found are (SRF2-S-TIH10; CAF2-S-LAL9; CAF2-SLAL13
and CAF2-S-BAH27). These new achromatic pai
Longer follow-up defense , one of basketball skills that require the team collective action involving active part and consistent to acquire bouncing balls even not be a chance for members of the team striker acquisition rebounding from the target area and bring it back again , which reduces the chances of scoring, and it enables team members defender of the performance of fast attack and score points for being the increase your chances of success.In light of the foregoing, reflected the importance of research in achieving the objective basis of skill tests that require a circumstance similar to the circumstances of the game with the standard operating procedures for the registration, and that the validity judged by consistency between tests
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
High cost of qualifying library standard cells on silicon wafer limits the number of test circuits on the test chip. This paper proposes a technique to share common load circuits among test circuits to reduce the silicon area. By enabling the load sharing, number of transistors for the common load can be reduced significantly. Results show up to 80% reduction in silicon area due to load area reduction.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Piracy on phonograms is now, rightly, the crime of the electronic age. Despite the protection sought by States to provide for such registrations, whether at the level of national legislation or international agreements and conventions, but piracy has been and continues to pose a significant threat to the rights of the producers of those recordings, especially as it is a profitable way for hackers to get a lot of money in a way Illegal, which is contrary to the rules of legitimate competition. Hence, this research highlights the legal protection of producers of phonograms in light of the Iraqi Copyright Protection Act No. (3) of 1971, as amended.
The research aims to investigate the effects of GMAW or MIG welding process on the mechanical properties of dissimilar aluminum alloys 2024-T351 and AA 6061- T651. A series of experimental techniques have been conducted to evaluate mechanical properties of the alloys, by carrying out hardness, tensile and bending tests for welded and un-welded specimens.
Metal inert gas (MIG) has been carried out on sheet metal using ER- 4043(AlSi5) as a filler metal and argon as shielded gas. The welded joints were tested by X-ray radiography and Faulty pieces were excluded.
Welding joints without defects are subjected to heat treatment including heating the joints in furnace to 170 °C for half an hour then air cooling to rel
... Show MoreThe moon tree, the lover of the night, cholera, the sea changes its colors are poetic products left by the pioneer of free poetry, as many have called her. She used to write poetry and publish it in magazines and newspapers until she published it with collections that came into existence from an early age. Several factors helped her in that that contributed to the formation of her personality and the maturity of her talent, including factors Family, including environmental, and psychological, until she later became the focus of attention of many, so she became taught in the universities of London, and students stood by her method of writing free poetry, this poetic color that Badr Shaker Al-Sayyab participated in pioneering. Whoever exam
... Show More