thin films of se:2.5% as were deposited on a glass substates by thermal coevaporation techniqi=ue under high vacuum at different thikness
The nanostructured MnO2 /carbon fiber (CF) composite electrode was prepared using the anodic electrodeposition process. The crystal structure and morphology of MnO2 particles were determined with X-ray diffraction and field-emission scanning electron microscopy. The electrosorptive properties of the prepared electrode were investigated in the removal of cadmium ions from aqueous solution, and the effect of pH, cell voltage, and ionic strength was optimized and modeled using the response surface methodology combined with Box–Behnken design. The results confirm that the optimum conditions to remove Cd(II) ions were: pH of 6.03, a voltage of 2.77 V, and NaCl concentration of 3 g/L. The experimental results showed a good fit for the Freundli
... Show MoreIn this paper we have dealt with the word " בַּיִת" in the Book of Joshua because it makes one of those that highly employed the word בַּיִת" " in the Old Testament. The Book of Joshua comes sixth in the order of tanakh wich was written by Joshua son of Noon in Palestine during the fifteenth century B.C. and it covers a three-decade era extending from the death of Moses til the death of Joshua son of Noon.
The word " בַּיִת " in this paper refers to the place, where expressions are made by a noun modified by a noun . The modifier is"" בַּיִת , and the modified is another noun. Herein, we
... Show MoreThe performa of evaluation process is a process that should be carried out by all industrial management in order to stand on aspects of development or underdevelopment of the various departments and activities in its industrial project for the purpose of identifying obstacles and find out the causes and then avoid them quickly. And intended to rectify the performance evaluation of the activities of industrial project or economic union by measuring the results achieved within a specific operational process and compare it to what is already targeted, and often the time for comparison of one year.
The process of performance evaluation depends upon several criteria and indicators within the
... Show MoreIt is no secret for those concerned with language concerns that the issue of figurative feminization is one of the issues that does not follow a grammatical rule governed by the fact that the subject of knowledge of this is due to hearing as indicated by linguistic references and lexicons.This research opts to find out the origin of the feminization of the word sun in the Arabic language and in light of what some language specialists have argued that the origin of figurative feminization was due to non-linguistic motives related to religious and metaphysical beliefs, and that it was memory preserved in light of the linguistic heritage.The research concluded that the feminization of the sun goes back to what settled in their minds, which
... Show MoreThe research aims to determine the role of training strategy dimensions of (trainers، curriculum training programs، trainees and their desire for training، administrative and supervisory services and their impact on the success of the training program) in the entrepreneurial performance of the organization dimensions of (pre-planning، renovation and modernization، efficiency، effectiveness)، so search ranks of great importance because it addresses an important and modern issue in performance entrepreneurial، and strategy training، aware of the importance of the subject and expected outcomes (General company for electrical Industries - motor plant) surveyed، was an analysis of data obtained through field visits in addition to the q
... Show MoreThis research seeks to explore the impact of notifications on enhancing user engagement with websites, primarily through user subscriptions and their interaction with notifications on these websites. The significance of this study lies in its implications for crafting compelling headlines that capture users' attention, streamline their access to journalistic content, and align with the objectives and editorial policies of news websites. It sheds light on the factors influencing users' preferences for specific notifications and their engagement with content based on their individual interests, motivations, and the satisfaction derived from such interactions.
The researcher has reached several key findings, inc
Change the morphological characteristics with the change of the factors affecting it has been shown that the Tigris River has the characteristics of the morphology of the low values in terms of depth, width and perimeter wet and gradient which in turn affected the morphological and other characteristics in terms of the direction and pattern of runoff came through the study of 48 cross-section is taken of the Tigris River Year 2008 by section for each 1 km, it has been shown that the average width of the Tigris River does not exceed 221.1 meters and the average depth of 3.9 meters either wet ocean amounted to 268.9 meters and changed the cross-section area of the last section at a rate of 4594.3 square meters, and through the study turned
... Show MoreThe best design of subsurface trickle irrigation systems requires knowledge of water and salt distribution patterns around the emitters that match the root extraction and minimize water losses. The transient distribution of water and salt in a two-dimensional homogeneous Iraqi soil domain under subsurface trickle irrigation with different settings of an emitter is investigated numerically using 2D-HYDRUS software. Three types of Iraqi soil were selected. The effect of altering different values of water application rate and initial soil water content was investigated in the developed model. The coefficient of correlation (R2) and the root-mean-square error (RMSE) was used to validate the predicted numerical res
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More