In this work, polypyrrole (PPy) composites were chemically prepared by a chemical oxidation method. Also, Tungsten Trioxide (WO3) nanoparticles were prepared and added in certain proportions to PPy. The structure properties were studied for the polypyrole and tungesten trioxide separately before mixing them together. The X-ray diffraction (XRD) analysis revealed a hexagonal WO3 and a triclinic PPy. It was observed that the nano-composite prepared by the addition of WO3 with 10 and 20% volume ratios to PPy shows a triclinic phase with the presence of hexagons. The molecular structures of PPy, WO3, and PPy–WO3 nano composites were depicted by Fourier-transform infrare
... Show MoreThis research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai
... Show MoreA quantum mechanical description of the dynamics of non-adiabatic electron transfer in metal/semiconductor interfaces can be achieved using simplified models of the system. For this system we can suppose two localized quantum states donor state |D› and acceptor state |A› respectively. Expression of rate constant of electron transfer for metal/semiconductor system derived upon quantum mechanical model and perturbation theory for transition between |ð·âŒª and |ð´âŒª state when the coupling matrix element coefficient is smaller than 0.025eV. The rate of electron transfer for Au/ ZnSe and Au/ZnS interface systems is evaluated with orientation free energy using a Matlap program. The
... Show MoreOptimization is the task of minimizing or maximizing an objective function f(x) parameterized by x. A series of effective numerical optimization methods have become popular for improving the performance and efficiency of other methods characterized by high-quality solutions and high convergence speed. In recent years, there are a lot of interest in hybrid metaheuristics, where more than one method is ideally combined into one new method that has the ability to solve many problems rapidly and efficiently. The basic concept of the proposed method is based on the addition of the acceleration part of the Gravity Search Algorithm (GSA) model in the Firefly Algorithm (FA) model and creating new individuals. Some stan
... Show MoreBackground:-Anorectal malformation is a congenital anomaly of different varieties and its correction needs good experience , knowledge about this varieties and specific surgical tools,
otherwise the child may lose his the only chance to live normally without disastrous complication like incontinence.
Objective:-assessment of the advantage of this procedure in management of anorectal malformations and the percentage for anal continence.
Patients and methods:-. This study was carried out in the child's central teaching hospital in Baghdad total number (70) cases were included in the study, 37 males and 33 females: aged 7 days to 6 years. They attended the hospital between October 1998-october 2004.
&nbs
The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show More