Polyaniline organic Semiconductor polymer thin films have been prepared by oxidative polymerization at room temperature, this polymer was deposited on glass substrate with thickness 900nm, FTIR spectra was tested , the structural,optical and electrical properties were studied through XRD ,UV-Vis ,IR measurements ,the results was appeared that polymer thin film sensing to NH3 gas.
Reading is one of the essential components of the English language. Countries that use English as a second language (ESL) sometimes have difficulties in reading and comprehension. According to many researches, mother tongue has proved some interferences with learning a second language. This study investigated the results of reading difficulties of young second language learners in terms of accuracy, comprehension, and rate using the Neale Analysis of Reading Ability test. The study was carried out in one of the High Schools for Boys in Hyderabad, India and included Grade five, aged 10-12 years. In order to understand the reading difficulties of English as a second language, a qualitative approach was employed. Interview, reading tes
... Show MoreThe issue of the public in the directions and theories of the theater director in the world theater, especially after the emergence of realism and the crystallization of the term direction and the definition of the role of the director in 1850 AD by the Duke Max Mengen took different paths to the Greek, Roman and even Elizabethan audience because it was here subjected to the theatrical equation from its production and presentation due to the fact that the theatrical performance is a technical artistic production, and the audience participation, watching and consumption, and here the participation of the audience was subjected to three directions: the enlightenment in the sense of arousing sense, the incitement in the se
... Show MoreIn this work, the spirurid nematode Hartertia gallinarum was reported in the intestine of the spotted sandgrouse, Pterocles senegallus, collected in three different locations: Ga'ara Depression, Iraqi Western Desert, Zurbatiyah and Al-Attariyah, Middle of Iraq. Description and measurements of the nematode were given. The role of termites in the infection of P. senegallus with H. gallinarum was discussed. Occurrence of H. gallinarum in P. senegallus represents a new host record.
In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-
... Show MoreIn the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show More