In this work we present a detailed study on anisotype nGe-pSi heterojunction (HJ) used as photodetector in the wavelength range (500-1100 nm). I-V characteristics in the dark and under illumination, C-V characteristics, minority carriers lifetime (MCLT), spectral responsivity, field of view, and linearity were investigated at 300K. The results showed that the detector has maximum spectral responsivity at λ=950 nm. The photo-induced open circuit voltage decay results revealed that the MCLT of HJ was around 14.4 μs
New metal complexes of some transition metal ions Co(II), Cu(II) , Cd(II) and Zn(II) were prepared by their reaction with previously prepared ligands HLI= (P-methyl anilino) phenyl acetonitrile and HLII = (P-methyl anilino) –P– chloro phenyl acetonitrile . The two ligands were prepared by Strecker’s procedure which includ the reaction of p- toluidine with benzaldehyde and P- chlorobenzaldehyde respectively. Structures were proposed depending on atomic absorption , i.r. and u.v.visible spectra in addition to magnetic susceptibility and electrical conductivity measurements.
Fifty snails of Paropeas achatinaceum specimens were collected and classified from four areas in Baghdad-Iraq from the period between June and July, 2017. The snails were divided into two groups (each group contain 25 snails). Two environment conditions were used in this study. Natural environment considered as control and experimental environment contains Citrus sinensis (L.) roots as snail’s source food. The comparison result between snail weights in the nature and experimental environment was not significant (0.497, 95% confidence interval [CI] 0.01209–0.02309). Also, the comparison between snail weights in the nature environment and the food mean weight was significant (0.014, 95% confidence interval [CI] 0.00591-0.04109), while the
... Show MoreThe research involved attempt to inhibit the corrosion of Al-Si-Cu alloy in 2.5x10-3 mol.dm-3 NaOH solution (pH=11.4) by addition of six different inhibitors with three concentrations (1x10-3, 1x10-2, and 0.1 mol.dm-3). These inhibitors include three organic materials (sodium acetate, sodium benzoate, and sodium oxalate) and three inorganic materials (sodium chromate, disodium phosphate, and sodium sulphate). The data that concerning polarization behaviour are calculates which include the corrosion potential (Ecorr) and current density (icorr), cathodic and anodic Tafel slopes (bc & ba), and polarization resistance (Rp). Protection efficiency (P%) and activation energy (Ea) values were calculated for inhibition by the six inhibitors. The
... Show MoreAbstract
The nuclear structure of 28-40Si isotopes toward neutron dripline has been investigated in framework of shell model with Skyrme-Hrtree-Fock method using certain Skyrme parameterizations. Moreover, investigations of static properties such as nuclear densities for proton, neutron, mass, and, charge densities with their corresponding rms radii, neutron skin thicknesses, binding energies, separation energies, shell gap, and pairing gap have been performed using the most recent Skyrme parameterization. The calculated results have been compared with available experimental data to identify which of these parameterizations introduced equivalent results with the ex
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.