Pulsed laser ablation in liquid (PLAL) has become an increasingly important technique for metals production and metal oxides nanoparticles (NPs) and others. This technique has its many advantages compared with other conventional techniques (physical and chemical). This work was devoted for production of zirconia (ZrO2) nanoparticles via PLAL technique from a solid zirconium target immersed in a wet environment in order to study the effect of this environment on the optical properties and structure of ZrO2 nanoparticles. The solutions which used for this purpose is distilled water (D.W). The produces NPs were characterized by mean of many tests such as UV-visible (UV-Vis.), transmission electron microscope (TEM) and Z-Potential. The UV-Vis. A spectrum has atwavelength is 271 nm. The TEM test shows less than 10 nm average particle sizes with spherical and irregular shapes. Z-Potential test shows value about +56.1 mV which indicate for NPs stability with extremely low agglomeration solution.
This study investigates the challenges encountered by first-grade intermediate students in learning the Arabic language. It aims to identify specific obstacles that hinder language acquisition and proficiency among this demographic. Through qualitative and quantitative methods, including surveys and interviews with students, teachers, and parents, the research highlights key issues such as limited vocabulary, difficulties in grammar, lack of engagement with the material, and inadequate teaching resources. The findings reveal a complex interplay between cognitive, social, and educational factors that contribute to these challenges. The study underscores the need for targeted interventions, such as enhanced pedagogical strategies and improved
... Show MoreMany purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa
... Show MoreModeling the microclimate of a greenhouse located in Baghdad under its weather conditions to calculate the heating and cooling loads by computer simulation. Solar collectors with a V-corrugated absorber plate and an auxiliary heat source were used as a heating system. A rotary silica gel desiccant dehumidifier, a sensible heat exchanger, and an evaporative cooler were added to the collectors to form an open-cycle solar assisted desiccant cooling system. A dynamic model was adopted to predict the inside air and the soil surface temperatures of the greenhouse. These temperatures are used to predict the greenhouse heating and cooling loads through an energy balance method which takes into account the soil heat gain. This is not included in
... Show MoreExpectation in poetry is the ability of the poet to exceed the existence of the universe . It is the revealing of the hidden and the familiar. This feature of expecting is not related to the modern poetry only . It is a well - known feature that has long been assigned to old poetry like Al-Mutannabi an Al-Mu`arri who had their own unique ways of expecting and going beyond the current time and touching the future and making it a reality. Based on their awareness ,mature thinking and talent , they had the ability of reading what is to come ,even if they were mere suppositions and tentative readings. As for the modern poetry , we have poets like Amal Dunqil , Adonis ,and Al-Sayyab whose poems became expectati
... Show MoreGas and downhole water sink-assisted gravity drainage (GDWS-AGD) is a new process of enhanced oil recovery (EOR) in oil reservoirs underlain by large bottom aquifers. The process is capital intensive as it requires the construction of dual-completed wells for oil production and water drainage and additional multiple vertical gas-injection wells. The costs could be substantially reduced by eliminating the gas-injection wells and using triple-completed multi-functional wells. These wells are dubbed triple-completion-GDWS-AGD (TC-GDWS-AGD). In this work, we design and optimize the TC-GDWS-AGD oil recovery process in a fictitious oil reservoir (Punq-S3) that emulates a real North Sea oil field. The design aims at maximum oil recovery us
... Show MoreNowadays, university education stands in front of both students who feel they are weak and teachers who are addicted to using traditional and dependent teaching. This has led to have negative repercussions on the learner from different aspects, including the mental aspect and the academic achievement process. Therefore, the present research is concerned with finding a new teaching method that adopts the motivation by the fear of failure technique. Thus, the study aims to examine the effect of adopting this method on students’ academic achievement. To achieve this aim, an experimental method was used, and an achievement test was built for the curriculum material of level two students. The pretest test was applied on 17 male and female s
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show More