In this work the effect of annealing temperature on the structure and the electrical properties of Bi thin films was studied, the Bi films were deposited on glass substrates at room temperature by thermal evaporation technique with thickness (0.4 µm) and rate of deposition equal to 6.66Å/sec, all samples are annealed in a vacuum for one hour. The X-ray diffraction analysis shows that the prepared samples are polycrystalline and it exhibits hexagonal structure. The electrical properties of these films were studied with different annealing temperatures, the d.c conductivity for films decreases from 16.42 ? 10-2 at 343K to 10.11?10-2 (?.cm)-1 at 363K. The electrical activation energies Ea1 and Ea2 increase from 0.031 to 0.049eV and from 0.096 to 0. 162 eV with increasing of annealing temperature from 343K to 363K, respectively. Hall measurements showed that all the films are p-type.
يهدف البحث الى دراسة وتحليل الهندسة المتزامنة (CE) وتحسين التكلفة(CO)، واستعمال مخرجات الهندسة المتزامنة كمدخلات لتحسين التكلفة، وبيان دور الهندسة المتزامنة في تحسين جودة المنتوج، وتحقيق وفورات في وقت التصميم والتصنيع والتجميع وتخفيض التكاليف، فضلاً عن توظيف بعض النماذج لتحديد مقدار الوفورات في الوقت ومنها نموذج(Lexmark) ونموذج (Pert) لتحديد الوفورات في وقت التصميم وقت لتصنيع والتجميع. ولتحقيق اهداف
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show Moren this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show MoreThe current research dealt with the presence of ornaments and jewelry since ancient times، which express the social، religious or emotional status of the person who adorns them، in addition to being distinguished by a distinct aesthetic and luxury، that is، in a sense closely related to the social and economic status of people، and we note that jewelry is considered a symbol of luxury and luxury، and hence The need to study luxury appeared in the design of ornaments and jewelry because it refers to the adornment elements that are made of metals and precious stones، which actually indicate signs of status or position that distinguish social classes from each other. The problem was identified by the following question: Determine th
... Show MoreThe expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man
... Show MorePreparing teacher occupies the attention of many thinkers and philosophers since the age of
kaldinics ( people of mesoptam / 2342 pH ) to the Islamic age where moslems philosophers
focus their attention on thought and philosophy where the philosophy of that teaching
depends on : teacher , student and family begin .
So , the issue of preparing and training teacher occupies the attention of education scientists
depending on his vital and important role in implementing of teaching policies in philosophies
and Islamic educational thought , therefore , the preparing and development of the teacher
regards as one of the basics of teaching development because of its importance in
development of teaching performance and th
Commercial banks represent the main pivot in financing national economic activity and its development. The capital represents safety margin to depositors and represents a defense line that protects bank work from dangers. Basel committee requirements represent protection and comprehensive supervision to bank activities for depositors, debtors and the bank. It provides trust in bank dealings and tackles activities of high dangers. The most prominent of these requirements are capital adequacy that concerns bank management and supervision and auditing bodies such as the central bank and protecting banks that suffer weakness in its vital important borrowing activity that reflects weakness in implementing borrowing policy .The purpose
... Show MoreA mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreThe present study aims to describe the histological structure of kidney of, (Herpestes javanicus ) that inhabits Iraqi lands. Transverse sections of kidney stained with hematoxylin and eosin showed two distinct regions, the outer thin darkly stained cortex and inner thick lightly stained medulla, which further subdivided into external and internal medullary zones linked with one conical renal papilla. The lateral margin of the outer medullary tissue forms a secondary renal pyramid with a specialized fornix. All the nephrons in the kidney start with the renal corpuscle [Malpighian], which is formed from two distinct parts, these are a centrally located glomerulus, which represented by a tuft of blood capillaries and an outer Bowman’s capsu
... Show More