
The photo-electrochemical etching (PECE) method has been utilized to create pSi samples on n-type silicon wafers (Si). Using the etching time 12 and 22 min while maintaining the other parameters 10 mA/cm2 current density and HF acid at 75% concentration.. The capacitance and resistance variation were studied as the temperature increased and decreased for prepared samples at frequencies 10 and 20 kHz. Using scanning electron microscopy (SEM), the bore width, depth, and porosity % were validated. The formation of porous silicon was confirmed by x-ray diffraction (XRD) patterns, the crystal size was decreased, and photoluminescence (PL) spectra revealed that the emission peaks were centered at 2q of 28.5619° and 28.7644° for et
... Show MoreThis research aims to solve a problem in the field of accounting and financial knowledge in the world today, that is, the problem of creative accounting. Especially after the global financial crisis and the collapse of many large companies in the world, people find that they use creative accounting methods to distinguish them from reality, showing the results of their activities and their financial status. This research discusses the concept of creative accounting, the most important methods used in financial statements and its relationship with external auditing, and procedures to limit accounting creativity. This study uses descriptive analysis methods after confirming its theoretical aspects in practice. Using the statistical
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe study aims to identify how to build the media message in an artistic design style (infographic) to reach the mechanism of building the media message by infographic in the researched news sites. For the survey method, which is one of the best methods used to study the subject of the research, the researcher used the method of content analysis, the employee of the research tool, a quantitative and qualitative content analysis form for the study of 74 infographics that appeared during the research period in the research sample sites. The study revealed a number of results, most notably 1. The surveyed sites employed the information in a manner based on images, shapes and data, that is, through the use of the visual element and the
... Show MoreA theoretical investigation is carried out to study the effect of a pencil electron beam propagating inside the plasma region determining the hydrodynamic densities distribution with the aid of numerical analysis finite deference method (FDM).The plasma is generated and trapped by annular electron beams of fixed electron density 1x1014 m-3. The result of the study shows that the hydrodynamic density behaves as the increase in pencil electron beam. The hydrodynamic density ratio goes to more than double as the increase in pencil electron beam density to 1x1018 m-3.
Planning of electrical distribution networks is considered of highest priority at the present time in Iraq, due to the huge increase in electrical demand and expansions imposed on distribution networks as a result of the great and rapid urban development.
Distribution system planning simulates and studies the behavior of electrical distribution networks under different operating conditions. The study provide understanding of the existing system and to prepare a short term development plan or a long term plan used to guide system expansion and future investments needed for improved network performance.
The objective of this research is the planning of Al_Bayaa 11 kV distribution network in Baghdad city bas
... Show MoreA new laboratory study conducted on stepped spillways in order to investigate their efficiency of dissipating flow energy. All previous study on stepped spillway indicated that the flow energy dissipation decreased as increasing in discharge. Increasing in the step numbers and the spillway slope led to energy dissipation decrease. In this study, an experimental attempt to increase energy dissipation at variable discharges was performed on stepped spillway and that leads to decreasing the cost of initiating the stilling basin or may be ignoring it. Five spillways were constructed from concrete and tested to investigate and compare among them. Three were roughed by gravel with different size for each one, one of them was s
... Show MoreA new simple and sensitive spectrophotometric method is described for quantification of Nifedipine (NIF) and their pharmaceutical formulation. The selective method was performed by the reduction of NIF nitro group to yield primary amino group using zinc powder with hydrochloric acid. The produced aromatic amine was submitted to oxidative coupling reaction with pyrocatechol and ammonium ceric nitrate to form orange color product measured spectrophotometrically with maximum absorption at 467nm. The product was determined through flow injection analysis (FIA) system and all the chemical and physical parameters were optimized. The concentration range from 5.0 to 140.0 μg.mL-1 was obeyed Beer’s law with a limit of detection and quantitatio
... Show MoreThis paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.