In this study, SnS thin films were deposited onto glass substrate by thermal evaporation technique at 300K temperature. The SnS films have been prepared with different thicknesses (100,200 &300) nm. The crystallographic analysis, film thickness, electrical conductivity, carrier concentration, and carrier mobility were characterized. Measurements showed that depending on film thickness. The D.C. conductivity increased with increase in film thickness from 3.720x10-5 (Ω.cm)-1 for 100 nm thickness to 9.442x10-4 (Ω.cm)-1 for 300 nm thicknesses, and the behavior of activation energies, hall mobility, and carrier concentration were also studied.
Thin films of iridium doped indium oxide (In2O3:Eu)with different doping ratio(0,3,5,7,and 9%) are prepared on glass and single crystal silicon wafer substrates using spray pyrolysis method. The goal of this research is to investigate the effect of doping ratio on of the structural, optical and sensing properties . The structure of the prepared thin films was characterized at room temperature using X-ray diffraction. The results showed that all the undoped and doped (In2O3:Eu)samples are polycrystalline in structure and nearly stoichiometric. UV-visible spectrophotometer in the wavelength range (200-1100nm)was used to determine the optical energy gap and optical constants. The optical transmittance of 83% and the optical band gap of 5.2eV
... Show MoreExperimentation Multi effective and fertile grew human desire to discover new ways to express beauty in artwork .And dabble term experimentation in the performing arts and arts architecture, cinema and television in the test forms and interest in the visual effects and movements seek to establish and beauty and schools of thought in literature and art. This study aims to identify
Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreThe aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show More