Transparent thin films of CdO:Ce has been deposited on to glass and silicon substrates by spray pyrolysis technique for various concentrations of cerium (2, 4, and 6 Vol.%). CdO:Ce films were characterized using different techniques such as X-ray diffraction (XRD), atomic force microscopy(AFM) and optical properties. XRD analysis show that CdO films exhibit cubic crystal structure with (1 1 1) preferred orientation and the intensity of the peak increases with increasing's of Ce contain when deposited films on glass substrate, while for silicon substrate, the intensity of peaks decreases, the results reveal that the grain size of the prepared thin film is approximately (73.75-109.88) nm various with increased of cerium content. With a sur
... Show MoreNiO0.99Cu0.01 films have been deposited using thermal evaporation
technique on glass substrates under vacuum 10-5mbar. The thickness
of the films was 220nm. The as -deposited films were annealed to
different annealing temperatures (373, 423, and 473) K under
vacuum 10-3mbar for 1 h. The structural properties of the films were
examined using X-ray diffraction (XRD). The results show that no
clear diffraction peaks in the range 2θ= (20-50)o for the as deposited
films. On the other hand, by annealing the films to 423K in vacuum
for 1 h, a weak reflection peak attributable to cubic NiO was
detected. On heating the films at 473K for 1 h, this peak was
observed to be stronger. The most intense peak is at 2θ = 37
Despite scholars’ attention on the typology of modality as a linguistic phenomenon, yet the use of modality across varieties of English is not well visible in communication-based researches that take semantics, pragmatics and discourse issues as the objects for their investigation. The paper generates its data from six M. A. dissertations from Nigerian University and equal number of the M. A. dissertations from Iraqi University to qualitatively and quantitatively investigate the contextual use of modality within the pragmatic perspective. The data analysis reveals that modality such as usuality, potentiality, necessity, probability and obligation in the dissertations encapsulates interpersonal and authorial voice in which the mean
... Show MoreThe process of transformation from the central economy to a free economy requires restructuring the economy according to a new economic philosophy that relies on activating the role of private economic activity in which private and medium-sized institutions occupy an essential axis for their active role in the economies of all countries, especially those countries that have directed towards the market mechanism and sector leadership. The special process of economic development and the role that commercial banks can play in advancing the financing of these projects by establishing specialized business incubators for financing.
What encouraged countries to pay attention to these institutions is the ease of
... Show MoreThe study's primary purpose is to explore an appropriate way of monitoring and assessing water depths using the satellite remote sensing technique of the Al Habbaniyah Lake in Iraq. This research studied the experience-conditions (thresholds) of different bands for multi-temporal satellite image data with different satellite image sensors (Landsat 5-TM, and EO1-ALI) for the same region, to recognize regions of water depths. The threshold values are taken that to separate the Al Habbaniyah Lake to the required depths (shallow, deep, and very deep), as a supervised method. A three-dimension feature space plot had used to represent these regions. The relationship of the mean values of the three separated water regions with all TM and A
... Show MoreAbstract
The research’s goal lies in demonstrating the impact of the Federal Financial Supervision Endowment through the process of auditing the performance of the entities subject to its audit as to improve the performance of these entities, especially if the performance audit method is one of the newly applied methods that are compatible with the standards issued by the International Organization of Financial Supervision and Accounting Institutions which is the method of auditing performance according to the performance evaluation guide for programs and policies issued by the Federal Office of Financial Supervision.
T
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More