In this paper, a comparison between horizontal and vertical OFET of Poly (3-Hexylthiophene) (P3HT) as an active semiconductor layer (p-type) was studied by using two different gate insulators (ZrO2 and PVA). The electrical performance output (Id-Vd) and transfer (Id-Vg) characteristics were investigated using the gradual-channel approximation model. The device shows a typical output curve of a field-effect transistor (FET). The analysis of electrical characterization was performed in order to investigate the source-drain voltage (Vd) dependent current and the effects of gate dielectric on the electrical performance of the OFET. This work also considered the effects of the capacitance semiconductor on the performance OFETs. The values of current, as calculated using MATLAB simulation, exhibited an increase with increasing source-drain voltage. Also, the organic transistor modeling software was used to evaluate the transconductance calculated. The best results for the vertical OFET were achieved using the gate insulators of ZrO2.
Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreA hyperboloid solar concentrator (HSC) was designed with a truncation angle side to the entrance aperture by simulation in the Zemax Optical Design software. The (HSC) has a wide exposure range to solar radiation due to the relatively large entrance aperture. The design consists of an entrance aperture facing the sun to obtain the largest possible amount of solar radiation, and a small exit aperture compared to the entrance aperture whose mission is to receive solar radiation after it enters the entrance aperture and reflects it from the inner reflective walls of the (HSC). In the exit aperture, there is a detector to measure the number of rays incident on it, which is a measure of the optical efficiency of the s
... Show MoreThis study aimed to identify the role of school administration in achieving educational and learning goals from the point of view of educational supervisors in the stage of basic education. The descriptive method was adopted. As for the sample size, it has reached (59) educational supervisors. A questionnaire consisting of 29 paragraphs divided into four areas was used. The data were statistically analyzed on the Chi-square test, the percentage, and the mono-variance analysis. The result showed that the school administration contributes to achieving educational goals. It also works to solve problems in democratic ways, and in modern methods, there are differences in the criteria for choosing the headmaster. The study recommended that sch
... Show MoreObjectives: To assess the changes in blood vessel stiffness and digital pulse wave amplitude because of flowmediateddilatation, and to explore how these two variables change when endothelial dysfunction isexperimentally induced.Method: The experimental study was conducted at the departments of physiology at the College of Medicine,Mustansiriyah University, and the College of Medicine, Al-Iraqia University, Baghdad, Iraq, from October 14, 2021, toMay 31, 2022, and comprised healthy young males who were subjected to the flow-mediated dilatation techniqueon the left brachial artery. Pulse transit time and the amplitude of the digital pulse wave were measured duringreactive hyperaemia for 2.5 minutes from the left middle finger using a
... Show MoreObjective: the objective of this study was to compare the intraoperative blood loss, intraoperative time, postoperative pain and secondary hemorrhage between electrodissection and cold steel dissection tonsillectomy.
Methods: One hundred and six patients were enrolled in this study, the patients were randomly allocated into electrodissection group A (n=51) and cold steel dissection tonsillectomy group B (n=53). All patients are above 7 years and had history of recurrent tonsillitis and/or tonsillar hypertrophy with obstructive symptoms. Intraoperative parameters and postoperative outcome were assessed.
Results: In group A patients had statically significa
... Show MoreThe introduction of Industry 4.0, to improve Internet of Things (IoT) standards, has sparked the creation of 5G, or highly sophisticated wireless networks. There are several barriers standing in the way of 5G green communication systems satisfying the expectations for faster networks, more user capacity, lower resource consumption, and cost‐effectiveness. 5G standards implementation would speed up data transmission and increase the reliability of connected devices for Industry 4.0 applications. The demand for intelligent healthcare systems has increased globally as a result of the introduction of the novel COVID‐19. Designing 5G communication systems presents research problems such as optimizing
Background: White spot lesions are esthetic problems caused by subsurface enamel demineralization that seen as white opacity. Aim of the study: This study aimed to evaluate and to compare the color change after the treatment of the white spot lesions with resin nϔtrton and micro abrasion. Materials and Methods: rtϔ white spot lesions were generated on 48 premolar teeth by the use of a demineralization solution. The teeth were randomly divided using the Diagnodent into three study groups (16 teeth for each group) depending on the depth of the induced lesions: outer enamel, inner enamel and outer dentine. Then each group was fatherly subdivided into two groups (8 teeth for each group) the ϔrst group was treated wit
... Show MoreBackground In recent years, there has been a notable increase in the level of attention devoted to exploring capabilities of nanoparticles, specifically gold nanoparticles AuNPs, within context of modern times. AuNPs possess distinct biophysical properties, as a novel avenue as an antibacterial agent targeting Streptococcus Mutans and Candida Albicans. The aim of this study to create a nano-platform that has the potential to be environmentally sustainable, in addition to exhibiting exceptional antimicrobial properties against Streptococcus Mutans as well as Candida Albicans. Methods this study involved utilization of
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper