Nanocomposites of polymer material based on CdS as filler
material and poly methyl methacrylate (PMMA) as host matrix have
been fabricated by chemical spray pyrolysis method on glass
substrate. CdS particles synthesized by co-precipitation route using
cadimium chloride and thioacetamide as starting materials and
ammonium hydroxide as precipitating agent. The structure is
examined by X-ray diffraction (XRD), the resultant film has
amorphous structure. The optical energy gap is found to be (4.5,
4.06) eV before and after CdS addition, respectively. Electrical
activation energy for CdS/PMMA has two regions with values of
0.079 and 0.433 eV.
BixSb2-xTe3 alloys with different ratios of Bi (x=0, 0.1, 0.3, 0.5, and 2) have been prepared, Thin films of these alloys were prepared using thermal evaporation method under vacuum of 10-5 Torr on glass substrates at room temperature with different deposition rate (0.16, 0.5, 0.83) nm/sec for thickness (100, 300, 500) respectively. The X–ray diffraction measurements for BixSb2-xTe3 bulk and thin films indicate the polycrystalline structure with a strong intensity of peak of plane (015) preferred orientation with additional peaks, (0015) and (1010 ) reflections planes, which is meaning that all films present a very good texture along the (015) plane axis at different intensities for each thin film for different thickness. AFM measureme
... Show MoreMany economic entities working in multiple industrial fields suffer fromlow techniques in using modern administrative means in their works. The mostused tool in measuring required procedures is to adopt and use quality costs. inspite of complications and bronchial of operations in construction projects, Theresearcher was able to find a structure to quality costs according to traditionclassification (prevention, Appraisal, failure) which enables the calculation ofthese costs and then analyze results and setting standards which can beimplemented in evaluating strategic performance for targeted project. and theforge research in theoretical fly to quality and costs concerning it inconstruction section , as well as strategically performance a
... Show Morethe researchers Sought to determine the impact of the customer contact (Within a client contact there are two times, first is the total time required to create a service and within it there is contact time while the second time is the time of client contact ؛ where means a time that records the physical presence of the customer during the process of service) on operations performance by concentrate attention on the cost (labor productivity) and quality (patient ratio to the doctor) and speed (cycle time) and flexibility (the flexibility range) , as well as ruling out variable of innovation because of impossibility to measure this variable in the Specialty Center for Dental in al-alwia due to the center is lacking of mechanisms t
... Show MoreECG is an important tool for the primary diagnosis of heart diseases, which shows the electrophysiology of the heart. In our method, a single maternal abdominal ECG signal is taken as an input signal and the maternal P-QRS-T complexes of original signal is averaged and repeated and taken as a reference signal. LMS and RLS adaptive filters algorithms are applied. The results showed that the fetal ECGs have been successfully detected. The accuracy of Daisy database was up to 84% of LMS and 88% of RLS while PhysioNet was up to 98% and 96% for LMS and RLS respectively.
The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreThe aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn this paper, a comparison of production and domestic consumption of Iraq's food industries within economic environment of a sample of countries is presented. Tracked by a number of variables, To extrapolate the reality of this industry in terms of its importance to individual consumption and importance on national economy, then, to find size and type of obstacles facing the industry in Iraq. Relationship was measured through use of quantitative methods and digital data in the comparison process. Results showed that the large growth in the size of the population in Iraq is not the first multiplier in the high consumption of processed food, but the increase in the per-capita income. The treatment takes several aspects related to the gene
... Show More