In this study lattice parameters, band structure, and optical characteristics of pure and V-doped ZnO are examined by employing (USP) and (GGA) with the assistance of First-principles calculation (FPC) derived from (DFT). The measurements are performed in the supercell geometry that were optimized. GGA+U, the geometrical structures of all models, are utilized to compute the amount of energy after optimizing all parameters in the models. The volume of the doped system grows as the content of the dopant V is increased. Pure and V-doped ZnO are investigated for band structure and energy bandgaps using the Monkhorst–Pack scheme's k-point sampling techniques in the Brillouin zone (G-A-H-K-G-M-L-H). In the presence of high V content, the bandgap energy decreases from 3.331 to 2.043 eV as seen by the band diagram. PDOS diagram was utilized to get the insight of the electronic structure of the atoms and the amount to which all energy bands contribute to a particular orbit of the atoms. As the V content grew, so did the PDOS for all of the states. The manipulation of bandgaps was carried out in a way that narrowing the bandgaps occurs, resulting in a redshift of the absorption spectrum in the IR region. At lower photon energies, the imaginary and real parts dielectric functions have increased. The effectiveness of V atoms on transmissivity especially in the low energy region of the V-doped ZnO perovskite has been verified compared to the other theoretical results.
The tax policy is an important tool of fiscal policy tools which is usedasits multiple tools the State seeks to achieve objectives, such as theachievement of economic development.The importance of the research comes from the importance ofeconomic development resulting from economic policies and prudent fiscaland appropriate to the economic situation of Iraq at the moment is the mostimportant tax policy that taxes one of the most important financial instruments.The research aims to clarify the role of tax policy in developing of theIraqi economy.In an effort to achieve the goals researchers tried to prove thehypothesis ((The tax policy and through multiple tools that seeks to contributeto the achievement of economic development in Iraq)).
... Show MoreFor the first time in Iraq, two species of monogenetic tretamtodes of the genus Dactylogyrus were recorded from gills of Alburnus caeruleus from Tigris river at Al-Zaafaraniya, south of Baghdad during June 1995. The first species, Dactylogyrus sphyrna is characterized by having the seventh pair of marginal hooklets almost twice as large as other marginal hooklets, powerful inner and outer processes of median hooks especially the inner one which is expanded terminally, one connecting bar and long spirally twisted copulatory organ. The second species, Daclytogyrus phoxini differs from the first one by having marginal hooklets of the same size, inner and outer processes of median hooks are not powerful, two connecting bars
... Show More
The optimum balance values for different coefficient of spherical aberration (third and fifth degree also focal shift) were studied, the optical system includes different apertures (circle, ellipse, square and triangle) using point spread function (PSF). By using (Marechal) method; the minimum value of mean square of variance in wave front was founded, so we can get the maximum of central intensity according to (Strehl) criterion.
A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
Iris detection is considered as challenging image processing task. In this study efficient method was suggested to detect iris and recognition it. This method depending on seed filling algorithm and circular area detection, where the color image converted to gray image, and then the gray image is converted to binary image. The seed filling is applied of the binary image and the position of detected object binary region (ROI) is localized in term of it is center coordinates are radii (i.e., the inner and out radius). To find the localization efficiency of suggested method has been used the coefficient of variation (CV) for radius iris for evaluation. The test results indicated that is suggested method is good for the iris detection.
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreA loS.sless (reversible) data hiding (embedding) method inside an image (translating medium) - presented in the present work using L_SB (least significant bit). technique which enables us to translate data using an image (host image), using a secret key, to be undetectable without losing any data or without changing the size and the external scene (visible properties) of the image, the hid-ing data is then can be extracted (without losing) by reversing &n
... Show More