Preferred Language
Articles
/
LxeDTY8BVTCNdQwCFGrx
Fabrication and Enhancement of Organic Photodetectors Based on Iron Phthalocyanine Films
...Show More Authors

Iron–phthalocyanine (FePc) organic photoconductive detector was fabricated using pulsed laser deposition (PLD) technique to work in ultraviolet (UV) and visible regions. The organic semiconductor material (iron phthalocyanine) was deposited on n-type silicon wafer (Si) substrates at different thicknesses (100, 200 and 300) nm. FePc organic photoconductive detector has been improved by two methods: the first is to manufacture the detector on PSi substrates, and the second is by coating the detector with polyamide–nylon polymer to enhance the photoconductivity of the FePc detector. The current–voltage (I–V) characteristics, responsivity, photocurrent gain, response time and the quantum efficiency of the fabricated photoconductive detector were measured. The performance of the fabricated detector was taken under dark and illumination using two types of light sources: UV LED with wavelength (365[Formula: see text]nm), power of (10[Formula: see text]W) and Tungsten lamp with wavelength range between (500–800) nm and the optical power of (250[Formula: see text]W). The photoresponse enhancement was improved by coating the FePc films with 200[Formula: see text]nm of polyamide nylon polymer. This type of coating, which can be considered as a surface treatment, highly increased the photoresponse of the fabricated FePc UV detector. The results show that the responsivity increased four orders of magnitudes more than the responsivity of the uncoated FePc film. The effects of the coated polymers on the responsivity and the response time of the detector were investigated.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Iraqi stock market structure analysis based on minimum spanning tree
...Show More Authors

tock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.

View Publication
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Art Image Compression Based on Lossless LZW Hashing Ciphering Algorithm
...Show More Authors
Abstract<p>Color image compression is a good way to encode digital images by decreasing the number of bits wanted to supply the image. The main objective is to reduce storage space, reduce transportation costs and maintain good quality. In current research work, a simple effective methodology is proposed for the purpose of compressing color art digital images and obtaining a low bit rate by compressing the matrix resulting from the scalar quantization process (reducing the number of bits from 24 to 8 bits) using displacement coding and then compressing the remainder using the Mabel ZF algorithm Welch LZW. The proposed methodology maintains the quality of the reconstructed image. Macroscopic and </p> ... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2011
Journal Name
Engineering And Technology Journal
Off-Line Arabic Signature Recognition Based on Invariant Moments Properties
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Programming a Pneumatic Processes Sequence based on PLC by Demonstration
...Show More Authors

Abstract

Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
An efficient multistage CBIR based on Squared Krawtchouk-Tchebichef polynomials
...Show More Authors
Abstract<p>Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p</p> ... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref