We studied the effect of Ca- doping on the properties of Bi-based superconductors by
adding differ ent amounts of CaO
to the Bi
2
Sr2La2-xCaxCu3O10+δ
compound. consequently, we
obtained three samples A,B and C with x=0.0, 0.4 and 0.8 respectively. The usual solid-state
reaction method has been applied under optimum conditions. The x-ray diffraction analy sis
showed that the samples A and B have tetragonal structures conversely the sample C has an
orthorhombic structure. In addition XRD analysis show that decreasing the c-axis lattice
constant and thus decreasing the ratio c/a for samples A,B and C resp ectively. The X-ray
florescence proved that the compositions of samples A,B and C with the ratio of
Bi:Sr :La(Ca):Cu which were about 2:2:2:3. Resistivity were measured at different
temperatures under zero magnetic f ields and the data were interp reted. Sample A shows that
semiconductor behavior, sa mple B showed a metal behavior andsa mple C showed a
sup erconductor behaviors with transition temperatureat zeroresistanceTc( off set)
were 85 K .
Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology
Pure cadmium oxide films (CdO) and doped with zinc were prepared at different atomic ratios using a pulsed laser deposition technique using an ND-YAG laser from the targets of the pressed powder capsules. X-ray diffraction measurements showed a cubic-shaped of CdO structure. Another phase appeared, especially in high percentages of zinc, corresponding to the hexagonal structure of zinc. The degree of crystallinity, as well as the crystal size, increased with the increase of the zinc ratio for the used targets. The atomic force microscopy measurements showed that increasing the dopant percentage leads to an increase in the size of the nanoparticles, the particle size distribution was irregular and wide, in addition, to increase the surfac
... Show MoreAbstract: This study aims to investigate the backscattering electron coefficient for SixGe1-x/Si heterostructure sample as a function of primary electron beam energy (0.25-20 keV) and Ge concentration in the alloy. The results obtained have several characteristics that are as follows: the first one is that the intensity of the backscattered signal above the alloy is mainly related to the average atomic number of the SixGe1-x alloy. The second feature is that the backscattering electron coefficient line scan shows a constant value above each layer at low primary electron energies below 5 keV. However, at 5 keV and above, a peak and a dip appeared on the line scan above Si-Ge alloy and Si, respectively, close to the interfacing line
... Show MoreThis study deals with interpretation of stratigraphic and structural of Khlesia area north-west Iraq in Nineveh province, near the Iraq- Syria border, by using 2D seismic data. Synthetic trace are prepared by using available data of the well (Kh-1) using Geoframe program to define and picking the reflectors on seismic section. These reflectors are: (Within Fatha and Kurra Chine reflectors) representing Middle Miocene and Late Triassic ages respectively. A listric growth normal fault is affecting the stratigraphic succession, and normal fault as a result of collision of Arabian plate with Eurasian plate. In addition, minor normal faults (Dendritic and Tension) are developed on the listric normal growth fault
... Show MoreThis paper presents a grey model GM(1,1) of the first rank and a variable one and is the basis of the grey system theory , This research dealt properties of grey model and a set of methods to estimate parameters of the grey model GM(1,1) is the least square Method (LS) , weighted least square method (WLS), total least square method (TLS) and gradient descent method (DS). These methods were compared based on two types of standards: Mean square error (MSE), mean absolute percentage error (MAPE), and after comparison using simulation the best method was applied to real data represented by the rate of consumption of the two types of oils a Heavy fuel (HFO) and diesel fuel (D.O) and has been applied several tests to
... Show MoreThere is a great operational risk to control the day-to-day management in water treatment plants, so water companies are looking for solutions to predict how the treatment processes may be improved due to the increased pressure to remain competitive. This study focused on the mathematical modeling of water treatment processes with the primary motivation to provide tools that can be used to predict the performance of the treatment to enable better control of uncertainty and risk. This research included choosing the most important variables affecting quality standards using the correlation test. According to this test, it was found that the important parameters of raw water: Total Hardn
In this study, the electron energy distribution function (EEDF), the electron swarm parameters , the effective ionization coefficients, and the critical field strength (dielectric strength) in binary He-H2 gas mixture which is used as cryogenic for high-temperature superconducting power applications, are evaluated using two-term solution of the Boltzmann equation over the range of E/N ( the electric field to gas density) from 1 to 100 Td ( 1 Td=10-17 Vcm2) at temperature 77 K and pressure 2MPa, taking into account elastic ( momentum transfer) and inelastic cross-sections. Using the electron energy distribution function (EEDF) electron swarm parameters (electron drift velocity, mean electron e
... Show MoreThe modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the
... Show More