In this research, the Williamson-Hall method and of size-strain plot method was employed to analyze X- ray lines for evaluating the crystallite size and lattice strain and of cadmium oxide nanoparticles. the crystallite size value is (15.2 nm) and (93.1 nm) and lattice strain (4.2 x10−4 ) and (21x10−4) respectively. Also, other methods have been employed to evaluate the crystallite size. The current methods are (Sherrer and modified Sherrer methods ) and their results are (14.8 nm) and (13.9nm) respectively. Each method of analysis has a different result because the alteration in the crystallite size and lattice strain calculated according to the Williamson-Hall and size-strain plot methods shows that the non-uniform strain in nanoparticles.
Advertisement on smart phone shopping apps are a new way of driving users to satisfy their needs and influence their purchasing decisions, In this way, the research could be aimed to know The role of the relationship between the motivations for audience exposure to shopping apps advertisement and purchasing decisions, In order to achieve the objectives of the research, the researcher adopted the survey method and used the questionnaire and the scale to collect data and information, The researcher chose the "random sample multi stages", The sample size was (475) respondents from Baghdad city center (18 years and above) women and men.
Study showed structure of pecten oculi in the Kestrel Falco tinnunculus L.was
Pleated type and consisted of 17 folds which were thick. While in the Collared Dove
Streptopelia decaocto F. was Vaned type and consisted of 13 folds and it described
thin. The illustrated histological study of pecten oculi folds in the Kestrel and the
Collared Dove was composed of large number of capillaries, large blood vessels and
pigment cells which were few in Kestrel compare with the Collared Dove. The bridge
in the Kestrel and the Collared Dove pecten oculi was consisted of connective tissue,
many pigment cells, and contains on little capillaries and it linked the membrane to
the internal limiting membrane of the retina in the Kes
on this research is to study the effect of nickel oxide substitution on the pure phases superconductor Tl0.5Pb0.5Ba2Can-1Cun-xNixO2n+3-δ (n=3) where x=(0,0.2,0.4,0.6,0.8.and 1.0). The specimens in this work were prepared with used procedure of solid state reaction with sintering temperature 8500C for 24 h .we used technical (4-prob)to calculated and the critical temperature Tc . The results of the XRD diffraction analysis showed that the structure for pure and doped phases was tetragonal with phases high-Tc phase (1223),(1212) and low-Tc phase (1202) and add
... Show MoreThe grain hardness, wet and dry gluten contents, protein and ash contents are determined in grains from different cultivars of wheat which are important in food products, either which are present in raw materials or in final products. Wheat is also a very important food raw material, and flour as the final product of milling. The importance of knowing the physical and chemical properties of wheat and flour is due to the determination of quality and kind of flour which is produced after the milling process. In this work, some physical and chemical properties of different wheat cultivars are determined and the comparisons of these characteristics are performed in both wheat and flour. Uruq Wheat sample (W5) has the highest results when compar
... Show MoreThere are two ways that the contract might be formed with (contracting between persons who are attended and contracting between absence persons).the need for determining the precise moment of the contract , is so clear because there is a specify period separate between the declaration of acceptance and the knowledge with it .and it is clear from the four theories known for jurisprudence (theory of the declaration of the acceptance, theory of exporting the acceptance , theory of the arrival of the acceptance , theory of the knowledge with the acceptance ) . It is difficult to promote one theory on another one if we look at each one and the justification of its supporters and what the opponents of each theory expose. Legal background and diff
... Show MoreAbstract:
Musa son of Yaqoob son of Izra, the Spanish poet, linguist, and philosopher, was born in Granada. He has many poems representing types of poetry. Also, he had important books, such as "the Poetry of Israel" and "Contemplative Research". He is knowledgeable in both Hebrew and Arabic, because most of his books were written in Arabic and the then translated to Hebrew. It seemed that he was influenced by Arab poets, specifically Abo Firas, and borrowed many issues, such as comparison, repetition, exaggeration, etc. and included them in his poetry.
All know that Arabic literature clearly influenced Hebrew literature in the Spanish era. Ara
... Show MoreThe study aims to identify how to build the media message in an artistic design style (infographic) to reach the mechanism of building the media message by infographic in the researched news sites. For the survey method, which is one of the best methods used to study the subject of the research, the researcher used the method of content analysis, the employee of the research tool, a quantitative and qualitative content analysis form for the study of 74 infographics that appeared during the research period in the research sample sites. The study revealed a number of results, most notably 1. The surveyed sites employed the information in a manner based on images, shapes and data, that is, through the use of the visual element and the
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More