Accurate description of thermodynamic, structural, and electronic properties for bulk and surfaces of ceria (CeO2) necessitates the inclusion of the Hubbard parameter (U) in the density functional theory (DFT) calculations to precisely account for the strongly correlated 4f electrons. Such treatment is a daunting task when attempting to draw a potential energy surface for CeO2-catalyzed reaction. This is due to the inconsistent change in thermo-kinetics parameters of the reaction in reference to the variation in the U values. As an illustrative example, we investigate herein the discrepancy in activation and reaction energies for steps underlying the partial and full hydrogenation of acetylene over the CeO2(111) surface. Overall, we find th
... Show MoreAbstract:
The research aims to monitor the image of the man in the group (The Cart and the Rain) by the storyteller (Badiaa Amin); With the aim of highlighting an aspect of feminist writing, especially with regard to the relationship of women to men, and determining the form adopted by the storyteller in drawing the features of men.
The research used the descriptive-analytical method in the space of its textual formation, which aims to stand on the text and deconstruct its narrative significance. To provide a comprehensive picture of it.
Three images of the man appeared in the group's stories, represented by (the authoritarian, the negative, and the positive), and the image of the authoritarian ma
... Show MoreThe current research aims at testing the relationship between organizational immunity and preventing administrative and financial corruption (AFC) in Iraq. The Statistical Package for the Social Sciences program (R& SPSS) was used to analyse the associated questionnaire data. The research problem has examined how to activate the functions of the organizational immune system to enable it to face organizational risks, attempt to prevent administrative and financial corruption, and access the mechanisms by which to develop organizational immunity. A sample of 161 individuals was taken who worked in the Directorate General of Education, Karbala. Also, it was concluded to a lack of memory function for organizational immunity. In a
... Show MoreThis study has dealt with, the issue of classification of rural road network , in addition to prepare a suggested for the classification for this network in Iraq , this classification account , the specifications and characteristics of rural roads, population, and the range taking of settlements , then this classification was applied on the rural road network in the Najaf province there are four categories of classification ,the first is major arterial rural roads divided into two major arterial and minor arterial roads , while the second category collected roads which was divided into minor arterial roads and main collected roads. The third category was represented by Local Roads , it has been divided into paved roads and unpaved, the f
... Show MoreThe principle of an interview requires revenues to expenditures by linking the efforts and achievements and disclosure sufficient to result activity, in the case generate future benefits of a particular asset, this asset appears in the balance sheet to reflect with the rest of the accounting unit's assets on the strength of financial position In the absence of future benefits from the effort are so loaded effort on the result accounts that reflect the outcome of activity during a specific period if the month or be separated or fiscal year.
The researcher reached the following conclusions:
1- difficult to control the cash inflows and outflows as a result of the multiplicity of sources of funding.
2- wea
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt