Photodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreSpeech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra
The aim of the work is the synthesis and characterization of the tridentate Schiff base (HL) containing (N and O) as donor atoms type (ONO). The ligand is: (HL) phenyl 2-(2-hydroxybenzylidenamino)benzoate . This ligand was prepared by the reaction of (phenyl 2-aminobenzoate) with salicylaldehyde under reflux in ethanol and few drops of glacial acetic acid which gave the ligand (HL). The prepared ligand was characterized by (FT IR,UV–Vis) spectroscopy, Elemental analysis of carbon, hydrogen and nitrogen (C.H.N.) and melting point. The ligand was reacted with some metal ions under reflux in ethanol with (1 metal :2 ligand )mole ratio which gave complexes of the general formula: [M(L)2]Cl , M = Cr III La III and , Pr III Products were found
... Show MoreBackground :Alkaline phosphatase (ALP) was a widely used marker for skeletal and hepatobiliary disorders, but its activity was also increased in atherosclerosis and peripheral vascular disease. Several study has showed that ALP activity was increased in the sera of diabetic patients. The current study was conducted to evaluate ALP activity in type 2 diabetic patients and optimum conditions for enzyme activity in their sera.Methods: This study was carried out at in AL-Yarmok hospital(diabetic center) between February /2009 and April /2009. Fifty two patients with type 2 diabetes have been enrolled. Besides BMI, WHR, serum fasting blood glucose, ALP, HbA1C,uric acid and lipid profile levels have been performed .The relationship bet
... Show MoreAn accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More