The power factors and electronic thermal conductivities in bismuth telluride (Bi2Te3), lead-telluride (PbTe), and gallium arsenide (GaAs) at room temperature (300K) quantum wires and quantum wells are theoretically investigated. Our formalism rigorously takes into account modification of these power factors and electronic thermal conductivities in free-surface wires and wells due to spatial confinement. From our numerical results, we predict a significant increase of the power factor in quantum wires with diameter w=20 Ã…. The increase is always stronger in quantum wires than in quantum wells of the corresponding dimensions. An unconfined phonon distribution assumed based on the bulk lattice thermal conductivity is then employed to evaluate the possible enhancement of the thermoelectric figure of merit. The electronic thermal conductivity of a 20Ã… diameter wire and a 20Ã… layer thickness is found to be of no significant decrease. The resultant ZT, calculated for Bi2Te3, PbTe and GaAs, quantum wires and quantum wells, showed increase significantly. The additional thermoelectric figure of merit enhancement is mostly due to the two- and one-dimensional carrier confinement which lead to the enhancement of power factor.
Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block
... Show MoreJoseph Curtis wrote in his book (Introduction to Semiotics narrative and rhetoric) on the development of a semiotic project in exploring the meaning of communion. The book is rich in theoretical and analytical benefits both in the approach of texts and in the pursuit of letters in search of mechanisms of scriptural and scriptural generation and mechanics in narrative production, especially as the book offers exercises that help to assess the distance separating the narrative spread from the sin of the text, for the semiotics, Refers to the theoretical developments of the science of relations, through the combination of conventional definitions and the representative and comparative limitations, to provide an approach to the application o
... Show MoreA new procedure of depth estimation to the apex of dyke-like sources from
magnetic data has been achieved through the application of a derived equation. The
procedure consists of applying a simple filtering technique to the total magnetic
intensity data profiles resulting from dyke-like bodies, having various depths, widths
and inclination angles. A background trending line is drawn for the filtered profile
and the output profile is considered for further calculations.
Two straight lines are drawn along the maximum slopes of the filtered profile
flanks. Then, the horizontal distances between the two lines at various amplitude
levels are measured and plotted against the amplitudes and the resulted relation is a
In this paper, the first integrals of Darboux type of the generalized Sprott ET9 chaotic system will be studied. This study showed that the system has no polynomial, rational, analytic and Darboux first integrals for any value of . All the Darboux polynomials for this system were derived together with its exponential factors. Using the weight homogenous polynomials helped us prove the process.
Crime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin
... Show MoreVerrucae vulgares are commonly encountered. The present work is designed in an attempt to build a systematic procedure for treating warts by carbon dioxide laser regarding dose parameters, application parameters and laser safety.
Patients and Methods: The study done in the department of dermatology in Al-Najaf Teaching Hospital in Najaf, Iraq. Forty-two patients completed the study and follow up period for 3 months. Recalcitrant and extensive warts were selected to enter the study. Carbon dioxide laser in a continuous mode, in non-contact application, with 1 mm spot size was used. The patients were divided into two groups. The first group of patients consisted of 60 lesions divided to 6 equal groups, in whom we use different outputs a
A study of the Torymid collection of Iraq. resulted in undescribed species of the genus
Liodontonierus Gah. L. longicorpus sp. n. with 2 figures.
In the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, industry. This paper introduced the simulated model of a proposed self-balancing platform that described the self–balancing attitude in (X-axis, Y-axis, or both axis) under the influence of road disturbance. To simulate the self-balanced platform's performance during the tilt, an integration between Solidworks, Simscape, and Simulink toolboxes in MATLAB was used. The platform's dynamic model was drawn in SolidWorks and exported as a STEP file used in the Simscape Multibody environment. The system is controlled using the proportional-integral-deriva
... Show MoreThe aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally
... Show MoreAmong the available chaotic modulation schemes, differential chaos shift keying (DSCK) offers the perfect noise performance. The power consumption of DCSK is high since it sends chaotic signal in both of 1 and 0 transmission, so it does not represent the optimal choice for some applications like indoor wireless sensing where power consumption is a critical issue. In this paper a novel noncoherent chaotic communication scheme called differential chaos on-off keying (DCOOK) is proposed as a solution of this problem. With the proposed scheme, the DCOOK signal have a structure similar to chaos on-off keying (COOK) scheme with improved performance in noisy and multipath channels by introducing the concept of differential coherency used in DCS
... Show More