Preferred Language
Articles
/
ijp-894
Room Temperature Photodetector Based on ANISOTYPE (n-p) Ge-Si Heterojunction
...Show More Authors

In this work we present a detailed study on anisotype nGe-pSi heterojunction (HJ) used as photodetector in the wavelength range (500-1100 nm). I-V characteristics in the dark and under illumination, C-V characteristics, minority carriers lifetime (MCLT), spectral responsivity, field of view, and linearity were investigated at 300K. The results showed that the detector has maximum spectral responsivity at λ=950 nm. The photo-induced open circuit voltage decay results revealed that the MCLT of HJ was around 14.4 μs

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 15 2026
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Journal Of Physics: Conference Series
Studies on The Effect of Temperature on The Charge Transfer Reaction Rate of N3 Dye When Contacted With Zinc Sulfide Semiconductor
...Show More Authors
Abstract<p>In this paper, the effect of temperature on the charge transfer rate of dye (N3) in contact with ZnS semiconductors is discussed and studied when electrons move from the excited N3 dye to the conduction band of ZnS based on quantum shift theory. In a heterogeneous system, the energy levels are assumed to be continuous, and the N3-ZnS system is surrounded by a variety of polar solvent media. The transition energy of the N3/ZnS heterojunction was calculated using seven different solvents at room temperature, considering the refractive index and dielectric constant of the solvents and the ZnS semiconductor, respectively. The charge-transport reaction rate was calculated over different te</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Sum of Squares of ‘n’ Consecutive Carol Numbers
...Show More Authors

The discussion in this paper gives several theorems and lemmas on the Sums of Squares of  consecutive Carol Numbers. These theorems are proved by using the definition of carol numbers and mathematical induction method. Here the matrix form and the recursive form of sum of squares of  consecutive Carol numbers is also given. The properties of the Carol numbers are also derived.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Oct 19 2024
Journal Name
Chemical Papers
Hydroisomerization of n-hexane over Pt/TiO2 catalysts
...Show More Authors

One of the most important processes to obtain gasoline with high octane numbers is isomerization. In this paper, Pt/TiO2 was prepared successfully by using the sol–gel method by hydrolysis of titanium tetraisopropoxide as a titania source with ethanol and then platinum was loaded on the synthesized catalyst; the result shows that the sample prepared has a good crystallinity with a surface area of about 85 m2 /g and a pore volume of 0.1938 cm3 /g, while XRD shows that the prepared sample was anatase phase. The efect of both temperature and liquid hourly space velocity of the prepared catalyst was achieved by hydroisomerization of n-hexane in a fxed bed reactor with a temperature of 200–275 °C and LHSV 0.5–2h−1. The results show

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Synthesis and Copolymerization of several N-substituted acrylamides
...Show More Authors

Five N-substituted acrylamides were prepared by reaction of substituted aromatic primary amines with acryloyl chloride in the presence of triethyl amine. The synthesized acrylamides were allowed to introduce copolymerization reaction with three vinylic monomers including acrylonitrile, methyl acrylate and methyl methacrylate respectively to obtain eleven new copolymers having different physical properties which may used in different applications.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Liquid-Liquid Equilibria of N-Methylpyrrolidone and Hydrocarbon
...Show More Authors

View Publication Preview PDF