Copper doped Zinc oxide and (n-ZnO / p-Si and n-ZnO: Cu / p-Si) thin films thru thickness (400±20) nm were deposited by thermal evaporation technique onto two substrates. The influence of different Cu percentages (1%,3% and 5%) on ZnO thin film besides hetero junction (ZnO / Si) characteristics were investigated, with X-ray diffractions examination supports ZnO films were poly crystal then hexagonal structural per crystallite size increase from (22.34 to 28.09) nm with increasing Cu ratio. The optical properties display exceptional optically absorptive for 5% Cu dopant with reduced for optically gaps since 3.1 toward 2.7 eV. Hall Effect measurements presented with all films prepared pure and doped have n-types conductive, with a ma
... Show MoreIn this paper, introduce a proposed multi-level pseudo-random sequence generator (MLPN). Characterized by its flexibility in changing generated pseudo noise (PN) sequence according to a key between transmitter and receiver. Also, introduce derive of the mathematical model for the MLPN generator. This method is called multi-level because it uses more than PN sequence arranged as levels to generation the pseudo-random sequence. This work introduces a graphical method describe the data processing through MLPN generation. This MLPN sequence can be changed according to changing the key between transmitter and receiver. The MLPN provides different pseudo-random sequence lengths. This work provides the ability to implement MLPN practically
... Show MoreAbstract:
Objective: The study was done to evaluate nurses’ knowledge and practices toward physical restraint at critical care unit
Methodology: Fifty nurses, who were selected by a non-probability (convenient) sampling method, participated in this descriptive study. The instrument of the study was knowledge parts of the questionnaire were initially developed in the U.S.A for nursing homes; in 2006 they were adopted for all hospital units by the original developers. The knowledge section of the questionnaire consisted of 20 items, which were used to measure knowledge of nurses towards the definition, indications and contra
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreThe principle in the language is that each word has one meaning. This is because the purpose of language development is for understanding, understanding, and communication between people. The language is sounds with which each people expresses their Arabic language did not stop at this point, but rather needed another next stage or to convey additional features or characteristics that would qualify it. To be the language of the Qur’an and revelation, and capable of carrying this heavy burden.
النظام السياسي في كوريا الشمالة