Vacuum evaporation technique was used to prepare pure and doped ZnS:Pb thin films at10% atomic weight of Pb element onto glass substrates at room temperature for 200 nm thickness. Effect of doping on a.c electrical properties such as, a.c conductivity, real, and imaginary parts of dielectric constant within frequency range (10 KHz - 10 MHz) are measured. The frequency dependence of a.c conductivity is matched with correlated barrier hoping especially at higher frequency. Effect of doping on behavior of a.c mechanism within temperature range 298-473 K was studied.
Abstract
The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism
... Show MoreDespite all the possibilities held by Iraq for the production of poultry , but there is low and clear in the level of production and a rise in costs and a decline in per capita consumption is due to a number of reasons, including poor investment , stop government subsides , dumping policies , market Bolmottagat imported , the contribution of the merchant squandering of national capacity , weak base material for the growth of this sector , the security situation and the crisis of energy and others .
Despite all this research has shown that there are great investment opportunities in this very sector of the market size and absorptive capacity of his and the growth of per capita income and level of cul
... Show MoreThe research statement to the amount of the contribution of information and communication technology in the quality of tourism and hotel services, and determine the relationship between the impact of information and communication and the quality of tourism services technology, The importance of the research is to establish the philosophical thinking of the nature of variables, as a modern administrative terminology and employ them towards the quality of tourism and hotel services, the research dealt with a problem expressed by a number of intellectual and practical questions, Was formulated based on the current situation witnessed by the tourism sector and hotel in Iraq, and the real gap was the lack of awareness of the impo
... Show MoreThe social networking sites have become one of the most important promotional instruments for their characteristic of facilitation of communication and the creation of public platform for discussion and formation of new points of view. These sites were used in the political marketing process where politicians use Facebook pages to promote their ideologies and spread their programs for the purpose of an influencing public opinion.
This research deals with the way by which political products are the Iraqi parliament. We adopt the methodology for analyzing the contents of these pages during three months starting from September,12 2016 to March 1, 2017 characterized by a lot of changes and events, in particular the beginning of the war o
Background: Mothers are considered as the key role in effect on child's dental behavior. So it is important to involve her in oral health promotion program to prevent early childhood dental caries from occurring in early age. Objectives: To identify the knowledge, practice and attitude of mothers about the oral health of their children. And to measure the change in oral hygiene of children aged (4-7) years old after one month of interventional program on their mothers. Type of study: Non-randomized interventional.Methods: Non-randomized interventional study for one month in Al Shaab area in Baghdad to 65 mothers who have children aged (4-7) years .A modified administrated questionnaire is given to assess mothers’ knowledge, practice an
... Show MoreThe urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023