In this research , pure Cadmium Oxide thin films were prepared by thermal evaporation Under vacuum method , where pure cadmium metal was deposited on glass Substrate in Room temperature (300K) at thickness (400 ± 30) nm with Deposition rate(1.1 ± 0.1) nm/sec And then we oxidize a pure cadmium Film in Temperature ( 350ºC ) for one hour with existence air flow. This research contained study of the influence of doping process by Tin metal (Sn) with two different ratios (1,3) % at substrate temperature (473K ) on th
... Show MoreThe accuracy of the skillful performance of the front and back dimensions of badminton in volleyball, occurs through the investment of complex exercises (physical skills) in a single performance and its characteristics that give the correct movement behavior and speed to the accuracy of the performance of the strokes as well as the identification of changes in some physiological indicators of By using these compound exercises. The research problem lies: I found a weakness in the accuracy of the performance of the front and back dimensions strike and diagnosed this through the tests that it conducted on the players to identify and know the problem, and attributed this weakness to a weakness in the necessary physical and skill abilities and t
... Show MoreThis study aims to recognize the process of using computer in publicschools in Ma`an governorate in terms of hardware, capabilities, and teachers usage. It also aims to identify the most important obstacles those schools face from a teachers perspective.
The study sample consists of (150) teachers from different disciplines. The researcher prepared two questionnaires related to the research pivotal, then presented to a group of arbitrators to be used in this final form. The data was analyzed statistically and the study concluded that there is a shortage in the computer services provided to teachers, and there is a w
... Show MoreThe current study aimed to reveal the moral values available in the Arabic language textbook (Al-Mu’nes) for grades eleven and twelve for post-basic education in the Sultanate of Oman. The researcher adopted the descriptive approach using the sentence as measuring unit in the analysis process. The five fields of moral values and their subcategories values represented the categories of the analysis. Iterations of values and the percentages of iteration were calculated in those textbooks. Moreover and the analysis and stability of the process were confirmed.
After referring to previous studies, it was possible to de
... Show MoreThe fabricated Photodetector n-CdO /-Si factory thin films Altboukaraharara spatial silicon multi- crystallization of the type (n-Type) the deposition of a thin film of cadmium and at room temperature (300K) and thickness (300 ± 20nm) and the time of deposition (1.25sec) was antioxidant thin films cadmium (Cd) record temperature (673k) for one hour to the presence of air and calculated energy gap optical transitions electronic direct ( allowed ) a function of the absorption coefficient and permeability and reflectivity by recording the spectrum absorbance and permeability of the membrane record within the wavelengths (300 1100nm). was used several the bias ranged between 1-5 Volts. The results showed that this
... Show MoreThis paper presents a proposed neural network algorithm to solve the shortest path problem (SPP) for communication routing. The solution extends the traditional recurrent Hopfield architecture introducing the optimal routing for any request by choosing single and multi link path node-to-node traffic to minimize the loss. This suggested neural network algorithm implemented by using 20-nodes network example. The result shows that a clear convergence can be achieved by 95% valid convergence (about 361 optimal routes from 380-pairs). Additionally computation performance is also mentioned at the expense of slightly worse results.
The Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
In a report by Transparency Organization in 2010, Iraq has 200 newspapers, magazines, sixty-seven radio stations and 45 satellite TV channels. The increase in these figures is measured in days or weeks and not months and years. This fact confirms the importance of studying content providers, especially youth sports content, for two reasons: the first is that young people constitute the highest percentage in Iraqi society, with all the potential involved in shaping the future aspects; the second reason is that for years sport has become an important pillar in people's lives not only in the entertainment aspect as it was seen in the past; Rather, sport has an influential presence in politi
... Show MoreIn this work, the preparation of some new oxazolidine and thiazolidine derivatives has been conducted. This was done over two steps; the first step included the synthesis of Schiff bases A1-A5 in 72-88% yields by the condensation of isonicotinic acid hydrazide and aldehydes. The second step includes the cyclization of derivatives A1-A5 with glycolic acid and thioglycolic acid to obtain the desired products, oxazolidine derivatives B1-B5 (44-60% yields) and thiazolidine derivatives C1-C5 (41-61% yields), respectively. The structure of the prepared compounds was characterized using FT-IR, 1H NMR, and 13C NMR spectroscopy. Some of the produced compounds were tested for antioxidant properties.