Polymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room temperature. The magnitude of electrical conductivity was increased with the increase in the salt concentration and temperature. The blend electrolytes have a high dielectric constant at lower frequencies which may be attributed to the dipoles providing sufficient time to get aligned with the electric field, resulting in higher polarization. The reduction of activation energy (Ea) suggests that faster-conducting electrolyte ions want less energy to move.
A discussion about the repercussions of the exchange rate on the behavior of stock markets became one of the basic principles of financial economics. The Istanbul Stock Exchange , considered one of the fastest financial markets growing in the region, driven by solid economic activity, for a diversified economy which classified as one of the the fastest growing economies in the world. However, the aforementioned market witnessed sharp fluctuations in the past few months, coinciding with the continuous fluctuations in the exchange rate of the Turkish lira, posing a serious challenge to the economic and investment environment in a c
... Show MoreSocial marketing seeks to develop and integrate marketing concepts with other approaches to social change and aims to influence behaviors that benefit individuals and societies for the social good. The study investigates the type and level of influence of social marketing on customer behavior in tourism companies in Baghdad (Iraq). The sample size of the study is 135 people comprising directors, assistant directors, and marketing staff in tourism companies in Baghdad. A questionnaire was used as a tool to collect data and information, and was prepared by the researcher after it underwent validity, stability, and arbitration tests. The data was analyzed using the statistical program (SPSS v. 25, AMOS v. 23) and statistical methods have been
... Show MoreThe electrical properties of pure NiO and NiO:Au Films which are
deposited on glass substrate with various dopant concentrations
(1wt.%, 2wt%, 3wt.% and 4wt.%) at room temperature 450 Co
annealing temperature will be presented. The results of the hall effect
showed that all the films were p-type. The Hall mobility decreases
while both carrier concentration and conductivity increases with the
increasing of annealing temperatures and doping percentage, Thus,
indicating the behavior of semiconductor, and also the D.C
conductivity from which the activation energy decrease with the
doping concentration increase and transport mechanism of the charge
carriers can be estimated.
Cu X Zn1-XO films with different x content have been prepared by
pulse laser deposition technique at room temperatures (RT) and
different annealing temperatures (373 and 473) K. The effect of x
content of Cu (0, 0.2, 0.4, 0.6, 0.8) wt.% on morphology and
electrical properties of CuXZn1-XO thin films have been studied.
AFM measurements showed that the average grain size values for
CuXZn1-xO thin films at RT and different annealing temperatures
(373, 473) K decreases, while the average Roughness values increase
with increasing x content. The D.C conductivity for all films
increases as the x content increase and decreases with increasing the
annealing temperatures. Hall measurements showed that there are
two
This research seeks the effects of dubbed Turkish TV series on Iraqi audiences. The chosen sample is about 600 Iraqi students at Baghdad and al-Anbar Universities. This study consists of four sections: section one deals with the theoretical framework of the study. Section two studies the dubbed Turkish TV series. The third section explores the role of mass media in forming tendencies, and the last section seeks the field study by analyzing the tendencies if Iraqi viewers of these series.
The goal of this study is to know the role these series played in affecting the behavior and attitudes of Iraqi people and how it can change their morals.
The research ends with the number of results like the negative effect of these series on the
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreIris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show More