Study was made on the optical properties of Ge2oSe8othinfilms prepared by vac-uum evaporation as radiated by (0,34,69) Gy of 13 ray.The optical band gab Eg and tailing band A.Et were studied in the photon energy range ( 1 to 3)eV. The a-Ge20Se8o film was found to be indirect gap with energy gap of (1.965,1.9 , 1.82) eV at radiated by B ray with absorption doses of (0,34,69)Gy respectively.The Ea and AEt of Ge20Se80 films showed adecrease in E8 and an increase in AEt with radiation. This be-havior may be related to structural defects and dangling bonds.
Abstract
Abstract has many advantages as has historically been one of the regions leading cultural centers . for centuries , it has been a center of commertial and financial operations in Iraq. it is also rich in archeological sites and natural resources, but because of its wars and implementation of urban development strategies are effective and sustainable , so contracted the secretariat of Baghdad with the company (khatib and scirntiffic) for the preparation of the comprehensive development plan for the city of Baghdad in 2030 and funded by the world bank and the fact that the plan was approved ( three stages of it ) and only one phase remains the fourth stage, which is under discussion the aim of the
... Show MoreThe interaction in the city is reflected in the movement of people motivated by their activities and their economic and social goals, which include many variables subject to the planning process in the interpretation of this movement and the mapping of trends of transport intensity through the concept of transport function and its functional relationships with the uses of the earth in the sustainability and effectiveness of the movement of transport and Economic activity and population movement. Transport planners are concerned with the requirements of land use, which are linked to and included in the transport planning process as a factor for the future transport needs. There is a strong relationship between the transport system
... Show More
The sciences related to the Book of God are many, and the benefits of every science in it are abundant, and among those sciences is the science of readings, which is for the sake of science and the most honorable, due to its strong attachment to the Book of God Almighty. From this care, and aims to show the attention of scholars to the science of readings in general and the scholars of the fifth century in particular, as the literature on it abounded until it became the principal for those who came after them.
The research consists of an introduction that includes the objectives of the research, the reasons for choosing it, previous studies, research questions, and research terms, then a preface dealing with the im
... Show MoreBackground: Breast cancer is the most frequently diagnosed malignancy and the second leading cause of mortality among women in Iraq forming 23% of cancer related deaths. The low survival from the disease is a direct consequence to the advanced stages at diagnoses. Aim: To document the composite stage of breast cancer among Iraqi patients at the time of diagnosis; correlating the observed findings with other clinical and pathological parameters at presentation. Patients and Methods: A retrospective study enrolling the clinical and pathological characteristics of 603 Iraqi female patients diagnosed with breast cancer. The composite stage of breast cancer was determined according to UICC TNM Classification System of Breast Cancer and the Ameri
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreThis study was conducted for evaluating the cytotoxic effect of heat stable enterotoxin a (STa) produced by enterotoxigenic Escherichia coli on the proliferation of primary cancer cell cultures, obtained from tumor samples that were collected from (13) cancer patients and as follows: (five colon cancer patients, two bladder cancer patients, two breast cancer patients, two stomach cancer patients and two lung cancer patients), and on normal cell line (rat embryonic fibroblast / REF) (in vitro) with the use of different concentrations starting from (1) mg/ml and ending with (0.0002) mg/ml by making two fold serial dilutions by using the 96- well microtiter plate, and in comparison with negative (PBS) and positive (MMC, at concentration
... Show MoreInvestments in shares represent an essential component of companies’ assets and a source of profit making resources. These investments are linked to the areas of trading and speculation, which is reflected on their market value, which makes accounting for and evaluating these investments require their own accounting standards, and thus several international standards were issued regarding this as well as a statement of their impact on growth Sustainable, as the research problem is to show the impact of measuring investments in shares according to international accounting and financial reporting standards on the sustainable growth of economic units, the research sample and its reflection on audit procedures. In accordance with i
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show More