CdO films were deposited on substrates from glass, Silicon and Porous silicon by thermal chemical spray pyrolysis technique with different thicknesses (130 and 438.46) nm. Measurements of X-ray diffraction of CdO thin film proved that the structure of the Polycrystalline is cubic lattice, and its crystallite size is located within nano scale range where the perfect orientation is (200). The results show that the surface’s roughness and the root mean square increased with increasing the thickness of prepared films. The UV-Visible measurements show that the CdO films with different thicknesses possess an allowed direct transition with band gap (4) eV. AFM measurement revealed that the silicon porosity located in nano range. Cadmium oxide films have been used in many applications especially in the photo sensors, the results showed high response for sensitivity in (277) nm within ultraviolet region, So that, the sensitivity reached to (1156) % when the films have the thickness (130) nm by using the porous silicon substrate.
The research seeks to examine the image of women in Iraqi films produced after 2003 over the answer to questions such as “ level of the representation of women and appearing in films and features that are attributable to them and their relationships with men and their interests and tendencies , activities and ways and methods pursued to achieve their goals , or what appeared to be trying to achieve and whether made movies vivid and varied models for women, or confined to a rigid model and duplicate Is films raised issues concerning women? The research seeks to examine the image of women in Iraqi films produced after 2003 over the answer to questions such as “ level of the representation of women and appearing in films and features th
... Show MoreBack ground: Skin grafting is the most common form
of reconstructive surgery, and regeneration of
sensations in skin grafts is a complex process
influenced by many factors such as , the thickness of
the graft, the depth of the grafted bed, meshing of the
graft, the condition of the bed and the surrounding
area. So many studies performed on this subject, some
of them clinically based on subjective type of sensation
tests, and others histological to detect the presence of
nerve fibers in the grafted skin
Objectives: To detect return of sensations to split
thickness skin grafts by clinical methods.
Methods: From Oct. 1995 to Oct. 2010, a clinical
prospective study performed in Al wasity Hospital for
Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSolutions of dyes Rhodamine 6G (Rh6G) and Coumarin480(C480) were prepared at five concentrations (1x10-3, 5x10-4, 1x10-4, 5x10-5 and1x10-5) mol/l, the mixing was stirred to obtain on a homogenous solution, the(poly methyl-methacrylate) (PMMA) was solved by chloroform solvent with certain ratio, afterward (PMMA+Rh6G) and (PMMA+C480) thin films were prepared by casting method on glass block which has substrate with dimensions (7.5 x2.5)cm2, the prepared samples were left in dark place at room temperature for 24 hours to obtain uniform and homogenous thin films. UV-VIS absorption spectra, transmission spectra and fluorescence spectra were done to measure linear refractive index and linear absorption coefficient. The nonlinear optical proper
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More