This research is concerned with the re-analysis of optical data (the imaginary part of the dielectric function as a function of photon energy E) of a-Si:H films prepared by Jackson et al. and Ferlauto et al. through using nonlinear regression fitting we estimated the optical energy gap and the deviation from the Tauc model by considering the parameter of energy photon-dependence of the momentum matrix element of the p as a free parameter by assuming that density of states distribution to be a square root function. It is observed for films prepared by Jackson et al. that the value of the parameter p for the photon energy range is is close to the value assumed by the Cody model and the optical gap energy is which is also close to the value of the Cody gap of these films. While for the films prepared by Ferlauto et al. the value of the parameter is equal to and .
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
This research aims at answering many questions raised by the research problem concerning the view of the organizations under consideration for the concept of smart leadership and its most important dimensions, as well as the view of crisis management and its concept and most important methods through research objectives that define and clarify the smart leadership with its dimensions and methods of crisis management.
For the purpose of reaching the results of the research and testing the assumptions about the relationship between smart leadership and methods of crisis management, the researcher adopted a questionnaire, designed especially to be a criterion for the research, as the main tool for data coll
... Show MoreThe capital banking foundation stone upon which the bank in the practice of business activities, the more capital a good financial adequacy of the increased bank's ability to grant credit and expand the various activities and provide a safety element for depositors and other sources of funding to achieve profits and increase the trading volume of the shares, causing the rise the rate of return for the shares of banks and have the Central Bank as head of the banking system by issuing instructions capital increase banking, according to the requirements of economic development and increase gross domestic product by supporting investment projects that are financed through banks, the research aims to show the extent of the banks commitment to
... Show Morethe digital public relations aim at make the workers getting the necessary information about the governmental institutions where they work and the enveronment surrounding them. it also tries to let the workers get the special knowlege of tthe publich relations and their jobs like the works of planning , arranging the active communication and executive skills needed in their writing , editing , special art skills for designing , production and technological skills to deal with the computer.
the problem of the research includes some questions as :
1- what are the uses achieved by degetal public relations workers at Iraqi universities (Baghdad, Mustansiriya, and Iraqi)
2- what are the tools used to apply digital public relations
Design of experiments (DOE) was made by Minitab software for the study of three factors used in the precipitation process of the Sodium Aluminate solution prepared from digestion of α-Al2O3 to determine the optimum conditions to a produce Boehmite which is used in production of ɤ-Al2O3 during drying and calcination processes, the factors are; the temperature of the sodium aluminate solution, concentration of HCl acid added for the precipitation and the pH of the solution at which the precipitation was ended. The design of the experiments leads to 18 experiments.
The results show that the optimum conditions for the precipitation of the sodium aluminate solution which
... Show MoreA system was used to detect injuries in plant leaves by combining machine learning and the principles of image processing. A small agricultural robot was implemented for fine spraying by identifying infected leaves using image processing technology with four different forward speeds (35, 46, 63 and 80 cm/s). The results revealed that increasing the speed of the agricultural robot led to a decrease in the mount of supplements spraying and a detection percentage of infected plants. They also revealed a decrease in the percentage of supplements spraying by 46.89, 52.94, 63.07 and 76% with different forward speeds compared to the traditional method.
Laser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable