Preferred Language
Articles
/
ijp-894
Room Temperature Photodetector Based on ANISOTYPE (n-p) Ge-Si Heterojunction
...Show More Authors

In this work we present a detailed study on anisotype nGe-pSi heterojunction (HJ) used as photodetector in the wavelength range (500-1100 nm). I-V characteristics in the dark and under illumination, C-V characteristics, minority carriers lifetime (MCLT), spectral responsivity, field of view, and linearity were investigated at 300K. The results showed that the detector has maximum spectral responsivity at λ=950 nm. The photo-induced open circuit voltage decay results revealed that the MCLT of HJ was around 14.4 μs

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Synthesis and Characterization of New Metal Complexes of α-Aminonitriles Derived from P- Toluidine and Aromatic Aldehydes
...Show More Authors

New metal complexes of some transition metal ions Co(II), Cu(II) , Cd(II) and Zn(II) were prepared by their reaction with previously prepared ligands HLI= (P-methyl anilino) phenyl acetonitrile and HLII = (P-methyl anilino) –P– chloro phenyl acetonitrile . The two ligands were prepared by Strecker’s procedure which includ the reaction of p- toluidine with benzaldehyde and P- chlorobenzaldehyde respectively. Structures were proposed depending on atomic absorption , i.r. and u.v.visible spectra in addition to magnetic susceptibility and electrical conductivity measurements.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 09 2018
Journal Name
Research Journal Of Pharmacy And Technology
Sequencing of Mitochondrial COI gene in new Iraqi record Paropeas achatinaceum L. P. Feiffer, 1846, Gastropoda: Subulinidea
...Show More Authors

Fifty snails of Paropeas achatinaceum specimens were collected and classified from four areas in Baghdad-Iraq from the period between June and July, 2017. The snails were divided into two groups (each group contain 25 snails). Two environment conditions were used in this study. Natural environment considered as control and experimental environment contains Citrus sinensis (L.) roots as snail’s source food. The comparison result between snail weights in the nature and experimental environment was not significant (0.497, 95% confidence interval [CI] 0.01209–0.02309). Also, the comparison between snail weights in the nature environment and the food mean weight was significant (0.014, 95% confidence interval [CI] 0.00591-0.04109), while the

... Show More
Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Corrosion Inhibition of Al-Si-Cu Alloy in the Basic Media by UsingSix Inhibitors at Four Temperatures
...Show More Authors

The research involved attempt to inhibit the corrosion of Al-Si-Cu alloy in 2.5x10-3 mol.dm-3 NaOH solution (pH=11.4) by addition of six different inhibitors with three concentrations (1x10-3, 1x10-2, and 0.1 mol.dm-3). These inhibitors include three organic materials (sodium acetate, sodium benzoate, and sodium oxalate) and three inorganic materials (sodium chromate, disodium phosphate, and sodium sulphate). The data that concerning polarization behaviour are calculates which include the corrosion potential (Ecorr) and current density (icorr), cathodic and anodic Tafel slopes (bc & ba), and polarization resistance (Rp). Protection efficiency (P%) and activation energy (Ea) values were calculated for inhibition by the six inhibitors. The

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iraqi Journal Of Physics
Study of the Nuclear Structure of some Neutron Rich Si Isotopes Using Shell Model with Skyrme Interaction
...Show More Authors

  Abstract

      The nuclear structure of 28-40Si isotopes toward neutron dripline has been investigated in framework of shell model with Skyrme-Hrtree-Fock method using certain Skyrme parameterizations. Moreover, investigations of static properties such as nuclear densities for proton, neutron, mass, and, charge densities with their corresponding rms radii, neutron skin thicknesses, binding energies, separation energies, shell gap, and pairing gap have been performed using the most recent Skyrme parameterization. The calculated results have been compared with available experimental data to identify which of these parameterizations introduced equivalent results with the ex

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Engineering
Development of Spatial Data Infrastructure based on Free Data Integration
...Show More Authors

In recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho

... Show More
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF