CdO:NiO/Si solar cell film was fabricated via deposition of CdO:NiO in different concentrations 1%, 3%, and 5% for NiO thin films in R.T and 723K, on n-type silicon substrate with approximately 200 nm thickness using pulse laser deposition. CdO:NiO/n-Si solar cell photovoltaic properties were examined under 60 mW/cm2 intensity illumination. The highest efficiency of the solar cell is 2.4% when the NiO concentration is 0.05 at 723K.
Objective(s): Assess the effectiveness of osteoporosis prevention instruction program on nursing college students’
knowledge at Baghdad University.
Methodology: A quasi-experimental design was used to assess the effectiveness of osteoporosis prevention
instruction program on nursing college students at University of Baghdad from April 2011 to September 2011. A
random sample consisted of (40) females students from first year of Nursing College \ Baghdad University. The data
was collected by using constructed questionnaire, which consists of three parts. Part one: consists of demographic
information and health characteristics .Part two: consists of students’ daily life behaviors which include, dietary
behaviors, an
In this paper, the memorization capability of a multilayer interpolative neural network is exploited to estimate a mobile position based on three angles of arrival. The neural network is trained with ideal angles-position patterns distributed uniformly throughout the region. This approach is compared with two other analytical methods, the average-position method which relies on finding the average position of the vertices of the uncertainty triangular region and the optimal position method which relies on finding the nearest ideal angles-position pattern to the measured angles. Simulation results based on estimations of the mobile position of particles moving along a nonlinear path show that the interpolative neural network approach outperf
... Show Moreتعد مراجعة النظير واحدة من الأســاليب الحديثة فــي مجال الرقابة والتدقيق ونشــأة كأداة لقياس مــدى فاعليــة الرقابــة علــى الجــودة هو لبنة أساسية في إدارة الجودة الشاملة ووسيلة لتحســين أدوات الرقابــة المعمول بها، وللتحقق من مدى الانسجام بين المعايير الدولية للأجهزة العليا للرقابة المالية والمحاسبة والاجراءات المعمول بها من قبل الاجهزة العليا للرقابة وعليه فأن مراجعة النظير أداة تستخدم ف
... Show MoreThis Study is conducted to evaluate effects of (leaves, fruits) powder and (oil, alcohol) extract of Coriander (Coriandrum sativum) plant on some biological and physiological aspects of House fly, Musca domestica at laboratory conditions. Result show that these preparations caused biological effects represented in high dead percentage in second instar, fed on different concentrations of food treated with them reached to 27.6, 55.3 at concentration 20% of leaf and fruit powder respectively and 67.3, 77.2% at 10% of oil and alcohol extract of fruit, respectively. Furthermore, study also show reduction in pupation and adults emergence percentage. However, leafs powder had slighter effect than powder and extract of fruit of tested plant. The st
... Show MoreThis paper deals with modelling and control of Euler-Bernoulli smart beam interacting with a fluid medium. Several distributed piezo-patches (actuators and/or sensors) are bonded on the surface of the target beam. To model the vibrating beam properly, the effect of the piezo-patches and the hydrodynamic loads should be taken into account carefully. The partial differential equation PDE for the target oscillating beam is derived considering the piezo-actuators as input controls. Fluid forces are decomposed into two components: 1) hydrodynamic forces due to the beam oscillations, and 2) external (disturbance) hydrodynamic loads independent of beam motion. Then the PDE is discretized usi
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreABSTRACT: BACKGROUND: Estrogens has traditionally been known as the female hormone, but this idea has been challenged in early 1990’s and an essential physiological role for estrogen in male fertility was identified. Phytoestrogens are naturally occurring non-steroidal plant chemicals that can act like the female hormone estrogen. The herbs ( anise alfalfa and vervain ) chosen in this study contain phytoestrogens. OBJECTIVE: Previous studies demonstrated controversy of the effects of phytoestrogens on the rat testes .Hence, the present investigation was undertaken to investigate the influence of typical dose of herbs containing phytoestrogen on the rat testis. MATERIALS AND METHODS: Twenty-four apparently normal mature male rats we
... Show MoreThis research presents and discuss the results of experimental investigation carried out on geogrids model to study the behavior of geogrid in the loose sandy soil. The effect of location eccentricity, depth of first layer of reinforcement, vertical spacing, number and type of reinforcement layers have been investigated. The results indicated that the percentage of bearing improvement a bout (22 %) at number of reinforced layers N=1 and about (47.5%) at number of reinforced layers N=2 for different Eccentricity values when depth ratio and vertical spacing between layers are (0.5B and 0.75B) respectively
In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show More