III-V zinc-blende AlP, AlAs semiconductors and their alloy Aluminum Arsenide phosphide Al AsxP1-x ternary nanocrystals have been investigated using Ab- initio density functional theory (Ab-initio-DFT) at the generalized-gradient approximation (GGA) level with STO-3G basis set coupled with large unit cell method (LUC). The dimension of crystal is found around (1.56 – 2.24) nm at a function of increasing the sizes (8, 16, 54, 64) with different concentration of arsenide (x=0, 0.25, 0.5, 0.75 and 1) respectively. Gaussian 03 code program has been used throughout this study to calculate some of the physical properties such as the electronic properties energy gap, lattice constant, valence and conduction band as well as density of state. Re
... Show MoreStructure of unstable 21,23,25,26F nuclei have been investigated
using Hartree – Fock (HF) and shell model calculations. The ground
state proton, neutron and matter density distributions, root mean
square (rms) radii and neutron skin thickness of these isotopes are
studied. Shell model calculations are performed using SDBA
interaction. In HF method the selected effective nuclear interactions,
namely the Skyrme parameterizations SLy4, Skeσ, SkBsk9 and
Skxs25 are used. Also, the elastic electron scattering form factors of
these isotopes are studied. The calculated form factors in HF
calculations show many diffraction minima in contrary to shell
model, which predicts less diffraction minima. The long tail
This research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreThe performance grading system (superpave) has provided means to incorporate binder characteristics with
pavement failure types. It’s a comprehensive system that relates climate, traffic conditions and aging with
critical pavement distress. The objective of this paper is to develop an improved asphalt binder grading
system for Iraq based on the principal of superpave. The country was divided into different zones according
to the highest and lowest temperature ranges and traffic loading. The Performance graded binder proposed
for each zone was compared with some States of USA that have same hot weather of Iraq by using Long
Term Pavement Performance (LTPP v3.1) software. Iraqi asphalt samples were tested using the Supe
In this work, the fusion cross section , fusion barrier distribution and the probability of fusion have been investigated by coupled channel method for the systems 46Ti+64Ni, 40Ca+194Pt and 40Ar+148Sm with semi-classical and quantum mechanical approach using SCF and CCFULL Fortran codes respectively. The results for these calculations are compared with available experimental data. The results show that the quantum calculations agree better with experimental data, especially bellow the Coulomb barrier, for the studied systems while above this barrier, the two codes reproduce the data.
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreToday many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of ECG signal such as Q,R,S, and T waves. The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show More