This research is concerned with the re-analysis of optical data (the imaginary part of the dielectric function as a function of photon energy E) of a-Si:H films prepared by Jackson et al. and Ferlauto et al. through using nonlinear regression fitting we estimated the optical energy gap and the deviation from the Tauc model by considering the parameter of energy photon-dependence of the momentum matrix element of the p as a free parameter by assuming that density of states distribution to be a square root function. It is observed for films prepared by Jackson et al. that the value of the parameter p for the photon energy range is is close to the value assumed by the Cody model and the optical gap energy is which is also close to the value of the Cody gap of these films. While for the films prepared by Ferlauto et al. the value of the parameter is equal to and .
يهدف البحث الحالي إلى اختبار العلاقة بين نوعية حياة العمل والإبداع التنظيمي في ديوان وزارة التخطيط ، ولبلوغ الهدف المذكور وبناء على معطيات البحث الاستطلاعي للباحث بني ألانموذج الفرضي للبحث الذي ضم المتغير المستقل والمعتمد، واعتماداً على حركية الأنموذج صيغت فرضيتان، ولاختبار صحة الفرضيات وجمع المعلومات من عينة البحث البالغة (100) مدير يمثلون مرك
... Show MoreIn the process of translating Qur’anic texts, there is an urgent need for interpretations of the Qur’anic text due to the presence of many incomprehensible Qur’anic verses or words because of our distance from the standard Arabic, language in which the Holy Qur’an was revealed, and the introduction of the foreign words into our language, in addition to the fact that many Qur’anic words are no longer used. All this prompted the need for the interpretation of the Qur'anic text, Therefore, it is necessary for the translator to resort to the books of interpretation if he intends to translate the Qur’an
This research deals with the rhetoric purposes of the passive voice in the holy Quran. First, we put an introductory to the concept of the Quran language and its difference of the spoken Arabic language during the revelation period. Besides; we gave a brief about the structure passive voice form of Arabic language. Second, we explained the purposes of passive voice used in the holly Quran with sufficient examples, commentaries and clarifications about all the cases. Rhetoric purposes that we deals with are: concision, emphasize an idea, avoid using the subject because it is known and clear for all or because it is really unknown, etc. This part has contained the most important purposes for the use of passive voice in holy Quran. At the end
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreMeans of communication has a great impact on all fields of awareness including health awareness by increasing the knowledge of community about health and developing their abilities to improve human health and cultural awareness. According to the importance of health awareness for a community to develop their intellectual and physical integrity, the researcher has found that it is essential to know the role of means of communication as a source of information for many students being active and main segments to build their society intellectually, socially and economically.
The research has focused on the study of health awareness among students and their health knowledge derived from the means of communicat
... Show MoreThis book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.
We report a method of converting non-conductive plastic surfaces into conductive by plating either copper electroless or copper electroplating -carbon black containing bending Agent onto Perspex plastics . Various approaches have been studied in order to comparing properties of the plated copper for two methods such as scanning electron microscopy (SEM),thickness, roughness, porosity, tensile Strength and elongation. The results show that the surface of electroplating was uniform, compact, and continuous and it had an obvious metallic sheen, while the surface of plated copper for electroless for it had many pores. Also observed that the coating was composed of small cells. Thes
... Show MoreThe corrosion behavior of 2024 aluminium alloy was investigated in alkaline medium (pH=13) containing 0.6 . in absence and presence of different concentrations of three amino acids separately [Methionine, Glutamice acid and Lysine] as environmentally friendly corrosion inhibitors over the temperature range (293-308)K. Electrochemical polarization method using potentiostatic technique was employed. The inhibition efficiency increased with an increase of the inhibitor concentration but decreased with increase in temperature . The maximum efficiency value was found with lysine =80.4 of 293 k and 10 . concentration of lysine. The adsorption of the amino acids was found to obey Langmuir adsorption isotherm . Some thermodynamic parameter âˆ
... Show MoreThis book includes three main chapters: 1. Functions & Their Derivatives. 2. Minimum, Maximum and Inflection points. 3. Partial Derivative. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.
The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show More