In this work, SnO2 and (SnO2)1-x(ZnO)x composite thin films with different ZnO atomic ratios (x=0, 5, 10, 15 and 20%) were prepared by pulsed laser deposition technique on clean glass substrates at room temperature without any treatment. The deposited thin films were characterized by x-ray diffraction atomic force microscope and UV-visible spectrophotometer to study the effect of the ZnO atomic ratio on their structural, morphological and optical properties. It was found that the crystallinety and the crystalline size vary according to ZnO atomic ratio. The surface appeared as longitudinal structures which was convert to spherical shapes with increasing ZnO atomic ratio. The optical transmission and energy gap increased with increasing ZnO atomic ratio.
Creatinine and Schiff`s bases are well known for their diverse range of biological activities and are thought to be emerging and useful therapeutic targets for the treatment of several diseases. The present work was aimed at the synthesis of new imidazolidine-4-one, thiazolidine-4-one, and oxazolidine-4-one derivatives derived from creatinine and to illustrate their influence on a colon cancer cell line and assess their antioxidant activity. Creatinine was reacted with α-chloroethyl acetate to produce 2-ethyl acetate creatinine 1. Then, the reaction of compound 1 with n-propyl bromide afforded N-propyl-2-ethylacetate creatinine 2. Compound 2
... Show MoreNecessary and sufficient conditions for the operator equation I AXAX n*, to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.
Improving speaking skills of Iraqi EFL students was the main purpose of the current research. Thirty EFL students were selected as the research participants for achieving this aim. All students completed the pretest and then spent the next 25 weeks meeting for 90 minutes each to present their nine lectures, answer difficult questions, and get feedback on their use of language in context. Progressive-tests, posttests and delayed post-tests followed every three courses. The researcher utilized SPSS 22 to anal Analyze the data descriptively and inferentially after doing an ANOVA on repeated measurements. It has been shown that using the ideas of sociocultural theory in the classroom has an important and positive impact on students of
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre
... Show MoreThe definition of orthogonal generalized higher k-derivation is examined in this paper and we introduced some of its related results.
<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More