CdO films were deposited on substrates from glass, Silicon and Porous silicon by thermal chemical spray pyrolysis technique with different thicknesses (130 and 438.46) nm. Measurements of X-ray diffraction of CdO thin film proved that the structure of the Polycrystalline is cubic lattice, and its crystallite size is located within nano scale range where the perfect orientation is (200). The results show that the surface’s roughness and the root mean square increased with increasing the thickness of prepared films. The UV-Visible measurements show that the CdO films with different thicknesses possess an allowed direct transition with band gap (4) eV. AFM measurement revealed that the silicon porosity located in nano range. Cadmium oxide films have been used in many applications especially in the photo sensors, the results showed high response for sensitivity in (277) nm within ultraviolet region, So that, the sensitivity reached to (1156) % when the films have the thickness (130) nm by using the porous silicon substrate.
Indium Antimonide (InSb) thin films were grown onto well cleaned glass substrates at substrate temperatures (473 K) by flash evaporation. X-ray diffraction studies confirm the polycrystalline of the films and the films show preferential orientation along the (111) plane .The particle size increases with the increase of annealing time .The transmission spectra of prepared samples were found to be in the range (400-5000 cm-1 ) from FTIR study . This indicates that the crystallinity is improved in the films deposited at higher annealing time.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThis survey investigates the thermal evaporation of Ag2Se on glass substrates at various thermal annealing temperatures (300, 348, 398, and 448) °K. To ascertain the effect of annealing temperature on the structural, surface morphology, and optical properties of Ag2Se films, investigations and research were carried out. The crystal structure of the film was described by Xray diffraction and other methods.The physical structure and characteristics of the Ag2Se thin films were examined using X-ray and atomic force microscopy (AFM) based techniques. The Ag2Se films surface morphology was examined by AFM techniques; the investigation gave average diameter, surface roughness, and grain size mutation values with increasing annealing temperature
... Show MoreIn this paper, variable gain nonlinear PD and PI fuzzy logic controllers are designed and the effect of the variable gain characteristic of these controllers is analyzed to show its contribution in enhancing the performance of the closed loop system over a conventional linear PID controller. Simulation results and time domain performance characteristics show how these fuzzy controllers outperform the conventional PID controller when used to control a nonlinear plant and a plant that has time delay.
سلمان، ندى نجيب. 2015. التباين المكاني السكان الأميين في الوطن العربي للمدة 1990-2009. مجلة آداب ذي قار،مج. 4، ع. 15، ص ص. 101-126.