Preferred Language
Articles
/
ijp-223
The effect of annealing temperatures on the optical parameters of NiO0.99Cu0.01 thin films
...Show More Authors

NiO0.99Cu0.01 films have been deposited using thermal evaporation
technique on glass substrates under vacuum 10-5mbar. The thickness
of the films was 220nm. The as -deposited films were annealed to
different annealing temperatures (373, 423, and 473) K under
vacuum 10-3mbar for 1 h. The structural properties of the films were
examined using X-ray diffraction (XRD). The results show that no
clear diffraction peaks in the range 2θ= (20-50)o for the as deposited
films. On the other hand, by annealing the films to 423K in vacuum
for 1 h, a weak reflection peak attributable to cubic NiO was
detected. On heating the films at 473K for 1 h, this peak was
observed to be stronger. The most intense peak is at 2θ = 37.12o with
the preferential orientation of the films being (111) plane. The optical
properties of the films have been studied. The effect of annealing
temperature on the optical parameters of NiO0.99Cu0.01 such as
transmittance, reflectance, absorption coefficient, refractive index,
extinction coefficient, and real and imaginary parts of dielectric
constant has been reported.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Ingénierie Des Systèmes D Information
Performance Evaluation of Multi-Organization E-Government Based on Hyperledger Fabric Blockchain Platform
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Mathematical Biology And Neuroscience
Effects of fear and refuge strategy dependent on predator in food web dynamics
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
On (σ,τ)-Derivations and Commutativity of Prime and Semi prime Γ-rings
...Show More Authors

Let R be a Г-ring, and σ, τ be two automorphisms of R. An additive mapping d from a Γ-ring R into itself is called a (σ,τ)-derivation on R if d(aαb) = d(a)α σ(b) + τ(a)αd(b), holds for all a,b ∈R and α∈Γ. d is called strong commutativity preserving (SCP) on R if [d(a), d(b)]α = [a,b]α(σ,τ) holds for all a,b∈R and α∈Γ. In this paper, we investigate the commutativity of R by the strong commutativity preserving (σ,τ)-derivation d satisfied some properties, when R is prime and semi prime Г-ring.

View Publication Preview PDF
Crossref
Publication Date
Fri Oct 23 2020
Journal Name
Palarch’s Journal Of Archaeology Of Egypt/egyptology
A Multimodal Discourse Analysis of Visual Images in UNHCR Reports on Displaced Iraqis
...Show More Authors

The advent of UNHCR reports has given rise to the uniqueness of its distinctive way of image representation and using semiotic features. So, there are a lot of researches that have investigated UNHCR reports, but no research has examined images in UNHCR reports of displaced Iraqis from a multimodal discourse perspective. The present study suggests that the images are, like language, rich in many potential meanings and are governed by clearly visual grammar structures that can be employed to decode these multiple meanings. Seven images are examined in terms of their representational, interactional and compositional aspects. Depending on the results, this study concludes that the findings support the visual grammar theory and highlight the va

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2018
Journal Name
2018 Tenth International Conference On Advanced Computational Intelligence (icaci)
On high-level control of power-augmentation lower extremity exoskeletons: Human walking intention
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of Advanced Pharmaceutical Technology & Research
Factors affecting on in vitro release of miconazole from in situ ocular gel
...Show More Authors

The reason for conducting this study is to prolong release of miconazole in the ocular site of action by ocular-based gels (OBGs) formulations. The formulation factors affecting on the release from OBG should be studied using various gelling agents in various concentrations to achieve the improvement in retention and residence time in response to prolonged release. In this study, the formulations were prepared using carbopol 940, pectin, sodium alginate, poloxamer 407, and poly(methacrylic acid) at 0.5%, 1%, and 1.5% w/v, respectively. Hydroxypropyl methylcellulose E5 (HPMC E5) 1% was added as thickening agent/viscosity builder. The formulation containing carbopol 940, pectin and sodium alginate at 1.5% w/v, displayed a noticable im

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Jun 16 2022
Journal Name
Al-khwarizmi Engineering Journal
Path Planning and Obstacle Avoidance of a Mobile Robot based on GWO Algorithm
...Show More Authors

planning is among the most significant in the field of robotics research.  As it is linked to finding a safe and efficient route in a cluttered environment for wheeled mobile robots and is considered a significant prerequisite for any such mobile robot project to be a success. This paper proposes the optimal path planning of the wheeled mobile robot with collision avoidance by using an algorithm called grey wolf optimization (GWO) as a method for finding the shortest and safe. The research goals in this study for identify the best path while taking into account the effect of the number of obstacles and design parameters on performance for the algorithm to find the best path. The simulations are run in the MATLAB environment to test the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Notes on Traces of a Symmetric Generalized (?, ?)-Biderivations and Commutativity in Prime Rings
...Show More Authors

Let R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Mar 31 2020
Journal Name
College Of Islamic Sciences
Ruling on conducting a marriage contract through modern means of communication Juristic study
...Show More Authors

 

This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.

It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values ​​and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication