Preferred Language
Articles
/
4BixdZQBVTCNdQwCjRhW
Photodetector based on Rutile and Anatase TiO<sub>2</sub> nanostructures/n-Si Heterojunction
...Show More Authors

Photodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction

Publication Date
Wed Jul 05 2023
Journal Name
Chalcogenide Letters
Optimization physical properties of CdTe /Si solar cell devices fabricated by vacuum evaporation
...Show More Authors

We investigated at the optical properties, structural makeup, and morphology of thin films of cadmium telluride (CdTe) with a thickness of 150 nm produced by thermal evaporation over glass. The X-ray diffraction study showed that the films had a crystalline composition, a cubic structure, and a preference for grain formation along the (111) crystallographic direction. The outcomes of the inquiry were used to determine these traits. With the use of thin films of CdTe that were doped with Ag at a concentration of 0.5%, the crystallization orientations of pure CdTe (23.58, 39.02, and 46.22) and CdTe:Ag were both determined by X-ray diffraction. orientations (23.72, 39.21, 46.40) For samples that were pure and those that were doped with

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Corrosion Behavior of Nanocomposite Al-9 wt% Si Alloy Reinforced with Carbon Nanotubes
...Show More Authors

An effort is made to study the effect of composite nanocoating using aluminum-9%wt silicon alloys reinforced with different percentage (0.5,1,2,4)wt.% of carbon nanotubes (CNTs) using  plasma spraying. The effect of this composite on corrosion behavior for AA6061-T6 by extrapolation Tafel test in sea water 3.5wt% NaCl was invested. Many specimens where prepared from AA6061-T6 by the dimension (15x15x3)mm as this first set up and other steps include coating process, X-ray diffraction and SEM examination .The results show the CNTs increase the corrosion rate of the nanocomposite coatings with increasing the weight percentage of CNTs within the Al-Si matrix. Al-9wt%Si coating layer itself has less corrosion rate if compared with both n

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Al-kindy College Medical Journal
Comparison between the Use of bupivacaine 0.5%alone and bupivacaine 0.5% with nefopam 20mg in sciatic n block ( popliteal approach) and femoral n block in patients undergoing below knee surgery
...Show More Authors

Objective : Sciatic nerve block (popliteal approach) and femoral N block is a new technique other than general anesthesia in below knee surgery because it provides adequate muscle relaxation, with good intraoperative and post-operative analgesia. Nefopam is non opioid, non-respiratory depressant and non-sedative was mixed with local anesthetics drug to study the effects. This study was done to compare the onset and duration of sensory and onset time and duration of action of motor block following administration of either bupivacaine alone with administration of bupivacaine and Nefopam in patients undergoing below knee lower limb surgeries under ultrasound guided regional anesthesia.
Methods: 100 patients with American society of anest

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Diyala Journal Of Engineering Sciences
Design and Simulation of parallel CDMA System Based on 3D-Hadamard Transform
...Show More Authors

Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Sun Dec 31 2023
Journal Name
Iraqi Journal Of Information And Communication Technology
EEG Signal Classification Based on Orthogonal Polynomials, Sparse Filter and SVM Classifier
...Show More Authors

This work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Arabic Speech Classification Method Based on Padding and Deep Learning Neural Network
...Show More Authors

Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Fingerprints Identification and Verification Based on Local Density Distribution with Rotation Compensation
...Show More Authors

The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 30 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
SMS Spam Detection Based on Fuzzy Rules and Binary Particle Swarm Optimization
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Crossref