Preparation of superposed thin film (CdTe)1-xSex / ZnS) with concentration of (x= 0.1, 0.3, 0.5) at a temperature of substrate (Ts= 80 0C) by using Thermal Vacuum Evaporation System. The measurement of X-ray diffraction shows that the compounds CdTe, ZnS, (CdTe)1-xSex and (CdTe)1-xSex / ZnS have a polycrystalline structure, the C-V characteristic shows that the capacitance degrease by increasing the concentration (x) in reverse bias, while the I-V characteristic shows the current dark (Id) increase in forward and reverse bias by increasing (x) and the photocurrent (Iph) increase in reverse bias by increasing the concentration (x), the values of photocurrent are greater than from the values of the dark current for all concentrations.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAssessing water quality provides a scientific foundation for the development and management of water resources. The objective of the research is to evaluate the impact treated effluent from North Rustumiyia wastewater treatment plant (WWTP) on the quality of Diyala river. The model of the artificial neural network (ANN) and factor analysis (FA) based on Nemerow pollution index (NPI). To define important water quality parameters for North Al-Rustumiyia for the line(F2), the Nemerow Pollution Index was introduced. The most important parameters of assessment of water variation quality of wastewater were the parameter used in the model: biochemical oxygen demand (BOD), chemical oxygen dem
Most companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak
... Show MoreThis study aims to calculate the percentage of loss and its causes of the horticultural crops tangerines and Seville oranges in Baghdad governorate for the 2020 agricultural season and estimate the economic impacts of losses both crops tangerines and Seville oranges at the study samples level. The research followed both methods descriptive and the quantitative mathematical in estimating the loss of horticultural crops from tangerines and Seville oranges trees and calculating the economic impact of this loss. The results showed that the percentage of losses of tangerines and Seville oranges crops on the level of wholesalers was about 12% and 13% respectively; causing economic losses estimated at about 3184.41 Euro. The results also displayed
... Show MoreThis study aimed to identify the degree of use computers in administrative functions (planning, organization, controlling, and evaluation) among school leaders and assistants in public education schools in Sharoorah governorate ، as well as to identify obstacles of use computers in administrative functions from the perspective of school leaders and assistants male and female in public schools during the academic year 1439-1440, the study sample (66) school leaders and assistants, males (58), a and females (44), , and to answer the questions of the study, the researchers developed a questionnaire consisting of (60) items, has been verified sincerity and persistence, and data analysis was used frequencies, percentages an
... Show MoreThe present study aimed to investigate the toxic and mutagenic and anti – mutagenic effects of the aqueous extract (5, 10 and 15 mg/kg) of green tea (Camellia sinensis) in modulating the genotoxic effects of mitomycin C (MMC). Albino male mice (Mus musculs) were employed as a biological system and four parameters were performed in vivo; total leucocyte count, mitotic index, chromosomal aberrations and micronucleus formation. The plant extract was evaluated through three types of treatments. In the first, the extract was given alone orally. While the second and third treatment included two types of interactions with MMC; pre – and post – MMC treatments. All treatments were paralleled by negative and positive control
... Show More