This research is concerned with the re-analysis of optical data (the imaginary part of the dielectric function as a function of photon energy E) of a-Si:H films prepared by Jackson et al. and Ferlauto et al. through using nonlinear regression fitting we estimated the optical energy gap and the deviation from the Tauc model by considering the parameter of energy photon-dependence of the momentum matrix element of the p as a free parameter by assuming that density of states distribution to be a square root function. It is observed for films prepared by Jackson et al. that the value of the parameter p for the photon energy range is is close to the value assumed by the Cody model and the optical gap energy is which is also close to the value of the Cody gap of these films. While for the films prepared by Ferlauto et al. the value of the parameter is equal to and .
The primary objective of this study is to manage price market items in the construction of walls for affordable structures with load-bearing hollow masonry units using the ACI 211.1 blend design with a slump range of 25-50 mm that follows the specification limits of IQS 1077. It was difficult to reach a suitable cement weight to minimum content (economic and environmental goal), so many trail mixtures were cast. A portion (10-20%) of the coarse aggregates was replaced with concrete, tile, and clay-brick waste. Finally, two curing methods were used: immersion under water as normal curing, and water spraying as it is closer to the field conditions. The recommendation in IQS 1077 to increase the curing period from 14 to 28 days was tak
... Show MoreA cantilevered piezoelectric beam with a tip mass at its free end is a common energy harvester configuration. This paper introduces a new principle of designing such a harvester which increases the generated voltage without changing the natural frequency of the harvester: The attraction force between two permanent magnets is used to add stiffness to the system. This magnetic stiffening counters the effect of the tip mass on the natural frequency. Three setups incorporating piezoelectric bimorph cantilevers of the same type in different mechanical configurations are compared theoretically and experimentally to investigate the feasibility of this principle. Theoretical and experimental results show that magnetically stiffe
... Show MoreIn this study, some attenuation parameters of gamma shields were studied. This shields consisting of composite materials of Unsaturated polyester as a base material and Nano iron oxide (Fe2O3) and, micro iron (Fe) as reinforcement materials at different percentages (1, 3,5,7and 9)wt%, and with different thickness (1, 1.5, 2, 2.5, 3, 3.5and 4) cm. The results showed that the use of nanoparticles is better than the microparticales in the field of radiation shielding. It has been shown that the values of attenuation parameters of gamma it bitter in the case of nanoparticles than case of the use of micro material.
The multiple linear regression model is an important regression model that has attracted many researchers in different fields including applied mathematics, business, medicine, and social sciences , Linear regression models involving a large number of independent variables are poorly performing due to large variation and lead to inaccurate conclusions , One of the most important problems in the regression analysis is the multicollinearity Problem, which is considered one of the most important problems that has become known to many researchers , As well as their effects on the multiple linear regression model, In addition to multicollinearity, the problem of outliers in data is one of the difficulties in constructing the reg
... Show Morehe assignment model represents a mathematical model that aims at expressing an important problem facing enterprises and companies in the public and private sectors, which are characterized by ensuring their activities, in order to take the appropriate decision to get the best allocation of tasks for machines or jobs or workers on the machines that he owns in order to increase profits or reduce costs and time As this model is called multi-objective assignment because it takes into account the factors of time and cost together and hence we have two goals for the assignment problem, so it is not possible to solve by the usual methods and has been resorted to the use of multiple programming The objectives were to solve the problem of
... Show MoreIn all process industries, the process variables like flow, pressure, level, concentration
and temperature are the main parameters that need to be controlled in both set point
and load changes.
A control system of propylene glycol production in a non isothermal (CSTR) was
developed in this work where the dynamic and control system based on basic mass
and energy balance were carried out.
Inlet concentration and temperature are the two disturbances, while the inlet
volumetric flow rate and the coolant temperature are the two manipulations. The
objective is to maintain constant temperature and concentration within the CSTR.
A dynamic model for non isothermal CSTR is described by a first order plus dead
time (FO
The Web Design Quality Index, known as WDQI, was applied to assess the quality of websites for six Iraqi universities, namely Basra University, Mosul, Muthanna, Samarra, Dijla University College, and Al-Isra University College. The results of the index showed that the universities of Basra and Dijla University College had the highest value, at 71.07 and 70.39, respectively. Its final evaluation metric was that the website of these two universities needed a slight improvement. As for the rest of the other universities, the final values of the index ranged from 64.72-69.71. When the final values of the index are displayed on the final evaluation scale, it appears that the websites of the four universities need many improvements. The study
... Show MoreIn this research we been estimated the survival function for data suffer from the disturbances and confusion of Iraq Household Socio-Economic Survey: IHSES II 2012 , to data from a five-year age groups follow the distribution of the Generalized Gamma: GG. It had been used two methods for the purposes of estimating and fitting which is the way the Principle of Maximizing Entropy: POME, and method of booting to nonparametric smoothing function for Kernel, to overcome the mathematical problems plaguing integrals contained in this distribution in particular of the integration of the incomplete gamma function, along with the use of traditional way in which is the Maximum Likelihood: ML. Where the comparison on the basis of the method of the Cen
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More