Tin Oxide (SnO2) films have been deposited by spray pyrolysis technique at different substrate temperatures. The effects of substrate temperature on the structural, optical and electrical properties of SnO2 films have been investigated. The XRD result shows a polycrystalline structure for SnO2 films at substrate temperature of 673K. The thickness of the deposited film was of the order of 200 nm measured by Toulansky method. The energy gap increases from 2.58eV to 3.59 eV when substrate temperature increases from 473K to 673K .Electrical conductivity is 4.8*10-7(.cm)-1 for sample deposited at 473K while it increases to 8.7*10-3 when the film is deposited at 673K
Background: Endometriosis is defined as the presence or growth of ectopic endometrial tissue outside their usual site ( the uterus). It is a common condition in women. It may occur in the ovaries, fallopian tubes, vagina and rarely, endometriosis may occur in the abdomen and lungs. Endometriosis is common among women of reproductive age. It is either primary or secondary. The triad of diagnosis is a pain with menstruation, cesarean scar and a mass in the scar.
... Show MoreThe aim of the present investigation was to develop a microsponge delivery system of acyclovir to control its release when applied topically thereby reducing dosing frequency and enhancement patient compliance. The microsponges were produced by the oil in oil emulsion solvent diffusion method. The effect of different formulation and process variables such as internal phase volume, polymer type, drug-polymer ratio, stirring speed and stirring duration on microsponge production yield, loading efficiency, particle size and in-vitro drug release was evaluated. The result showed that the microsponge F2 prepared from Eudrajet RS polymer had optimum physical properties regarding the loading efficiency of 99.71_+ 0.7% and product
... Show MoreReceipt date:11/19/2020 acceptance date:10/1/2021 Publishing date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
Human rights are one of the basic concepts of modern and contemporary times, and political thought as the origin of political science and its source of knowledge have impact in this science and its branches
... Show MoreHuman health can be negatively impacted by exposure to loud noise, which can harm the auditory system. Traffic noise is the leading cause of noise pollution. This paper studies the problem of noise pollution on the roads in Baghdad, Iraq. Due to the increase in vehicle numbers and road network modifications in Baghdad, noise levels became a serious topic to be studied. The aim of the paper was thus to study traffic noise levels and the effect of the traffic stream on noise levels and to formulate a prediction model that identified the guidelines used for designing or developing future roads in the city. Then, the noise levels were measured based on five variables: the functional classification of roads, traffic flow, vehicle speed,
... Show MoreWhen embankment is constructed on very soft soil, special construction methods are adopted. One of the techniques is a piled embankment. Piled (stone columns) embankments provide an economic and effective solution to the problem of constructing embankments over soft soils. This method can reduce settlements, construction time and cost. Stone columns provide an effective improvement method for soft soils under light structures such as rail or road embankments. The present work investigates the behavior of the embankment models resting on soft soil reinforced with stone columns. Model tests were performed with different spacing distances between stone columns and two lengths to diameter ratios of the stone columns, in addition to different
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreAbstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More