Preferred Language
Articles
/
ijp-458
Improvement the efficiency of SnO2/n-Si detector by engraving method using a CNC machine
...Show More Authors

Tin oxide was deposited by using vacuum thermal method on silicon wafer engraved by Computer Numerical Controlled (CNC) Machine. The inscription was engraved by diamond-made brine. Deep 0.05 mm in the form of concentric squares. Electrical results in the dark were shown high value of forward current and the high value of the detection factor from 6.42 before engraving to 10.41 after engraving. (I-V) characters in illumination with powers (50, 100, 150, 200, 250) mW/cm2 show Improved properties of the detector, Especially at power (150, 200, 250) mW/cm2. Response improved in rise time from 2.4 μs to 0.72 μs and time of inactivity improved 515.2 μs to 44.2 μs. Sensitivity angle increased at zone from 40o to 65o.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Posterior Estimates for the Parameter of the Poisson Distribution by Using Two Different Loss Functions
...Show More Authors

In this paper, Bayes estimators of Poisson distribution have been derived by using two loss functions: the squared error loss function and the proposed exponential loss function in this study, based on different priors classified as the two different informative prior distributions represented by erlang and inverse levy prior distributions and non-informative prior for the shape parameter of Poisson distribution. The maximum likelihood estimator (MLE) of the Poisson distribution has also been derived. A simulation study has been fulfilled to compare the accuracy of the Bayes estimates with the corresponding maximum likelihood estimate (MLE) of the Poisson distribution based on the root mean squared error (RMSE) for different cases of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the Performance of IT Governance According to COBIT5 Framework by Using the Balanced Scorecard
...Show More Authors

The research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.

The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison between some well- Known methods to estimate the parameter of the proposed method of measurement and the reliability of the distribution function with two parameters Rally by simulation
...Show More Authors

 

 

Abstract

            Rayleigh distribution is one of the important distributions used for analysis life time data, and has applications in reliability study and physical interpretations. This paper introduces four different methods to estimate the scale parameter, and also estimate reliability function; these methods are Maximum Likelihood, and Bayes and Modified Bayes, and Minimax estimator under squared error loss function, for the scale and reliability function of the generalized Rayleigh distribution are obtained. The comparison is done through simulation procedure, t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 26 2025
Journal Name
Journal Of Engineering
Drag Reduction by using Anionic Surfactants
...Show More Authors

View Publication
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Texts Ciphering by using Translation Principle
...Show More Authors

The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.

View Publication Preview PDF
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Investigation of the Optical Properties of the Achromatic Quadrupole Lens by Using the Rectangular Potential Distribution Model
...Show More Authors

An optimization calculation is made to find the optimum properties of combined quadrupole lens which consists of electrostatic and magnetic lens. Both chromatic and spherical aberration coefficients are reduced to minimum values and the achromatic aberration is found for many cases. These calculations are achieved with the aid of transfer matrices method and using rectangular model of field distribution, where the path of charged-particles beam traversing the field has been determined by solving the trajectory equation of motion and then the optical properties for lens have been computed with the aid of the beam trajectory along the lens axis. The computations have been concentrated on determining the chromatic and spher

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 30 2019
Journal Name
Journal Of Planner And Development
the effect of organizing the university environment on increasing its efficiency and directing economic resiurces
...Show More Authors

Technical education in Iraq Composed of, a complex system of technical competence and scientific, technical and administrative, which extends to cover large areas of the country and constitute a vicious circle between economic development, social and cultural rights through middle-management on the one hand, and between academic knowledge and political decision-making, which aims to bring such development On the other hand, in the light of that education is the actual technical extension applied to create the idea of complementarily between them. In Iraq, have been distributed institutes and technical colleges to achieve those goals, in addition to realizing the idea of integration between them and community, and integration of t

... Show More
View Publication
Publication Date
Thu Sep 01 2016
Journal Name
Chem Istry & Chem Ical Technology
SYN TH ESIS, CH ARACTERIZATION AN D AN TIM ICROBIAL ACTIVITY OF N EW N UCLEOSIDE AN ALOGUES FROM BEN ZOTRIAZOLE
...Show More Authors

Novel derivatives of 1-(´1, ´3, ´4, ´6-tetra benzoyl-β-D-fructofuranosyl)-1H- benzotriazole and 1-(´1, ´3, ´4, ´6-tetra benzoyl-β-D-fructofuranosyl)-1H- benzotriazole carrying Schiff bases moiety were synthesised and fully characterised. The protection of D- fructose using benzoyl chloride was synthesized, followed by nucleophilic addition/elimination between benzotria- zole and chloroacetyl chloride to give 1-(1- chloroacetyl)- 1H-benzotriazole. The next step was condensation reaction of protected fructose and 1-(1-chloroacetyl)-1H- benzotriazole producing a new nucleoside analogue. The novel nucleoside analogues underwent a second conden- sation reaction with different aromatic and aliphatic amines to provide new Schiff b

... Show More
Publication Date
Fri Oct 06 2017
Journal Name
Journal Of Engineering
Constructional Efficiency in Al_Ahwaar Traditional Architecture
...Show More Authors

Constructional Efficiency in architecture in general is one of the most important standard success for any structure and a measure of its continuity and relevance across time and space. Given the importance of Al-Ahwaar environment that owned the spatial, environmental, economic and social elements had a prominent impact in creation of architecture patterns form to create special architectural and structural environment, which had many qualities and ingredients that contributed to its continuity and existence over the years. From the premise that man and his environment is the main goal to any architectural style,

Thus the research problem focusing on the lack of clarity of the previous literatures in its st

... Show More
View Publication Preview PDF