In this study, pure Co3O4 nano structure and doping with 4 %, and
6 % of Yttrium is successfully synthesized by hydrothermal method.
The XRD examination, optical, electrical and photo sensing
properties have been studied for pure and doped Co3O4 thin films.
The X-ray diffraction (XRD) analysis shows that all films are
polycrystalline in nature, having cubic structure.
The optical properties indication that the optical energy gap follows
allowed direct electronic transition calculated using Tauc equation
and it increases for doped Co3O4. The photo sensing properties of
thin films are studied as a function of time at different wavelengths to
find the sensitivity for these lights.
High photo sensitivity doped Co3O4 with 6% of Yttrium, is a
118.774% at wavelength 620 nm, while for pure Co3O4 films no
sensitivity at the same wavelength. So, higher sensitivity is found for
doping Co3O4 with fast rise and fall times less than 1s.
Background: Vibration decreases the viscosity of composite, making it flow and readily fit the walls of the cavity. This study is initiated to see how this improved adaptation of the composite resin to the cavity walls will affect microleakage using different curing modes
Materials and methods: Standard Class V cavities were prepared on the buccal surface of sixty extracted premolars. Teeth were randomly assigned into two groups (n=30) according to the composite condensation (vibration and conventional) technique, then subdivided into three subgroups (n=10) according to light curing modes (LED-Ramp, LED-Fast and Halogen Continuous modes). Cavities were etched and bonded with Single Bond Universal
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreImage compression is a suitable technique to reduce the storage space of an image, increase the area of storage in the device, and speed up the transmission process. In this paper, a new idea for image compression is proposed to improve the performance of the Absolute Moment Block Truncation Coding (AMBTC) method depending on Weber's law condition to distinguish uniform blocks (i.e., low and constant details blocks) from non-uniform blocks in original images. Then, all elements in the bitmap of each uniform block are represented by zero. After that, the lossless method, which is Run Length method, is used for compressing the bits more, which represent the bitmap of these uniform blocks. Via this simple idea, the result is improving
... Show MoreWA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More