Preparation of superposed thin film (CdTe)1-xSex / ZnS) with concentration of (x= 0.1, 0.3, 0.5) at a temperature of substrate (Ts= 80 0C) by using Thermal Vacuum Evaporation System. The measurement of X-ray diffraction shows that the compounds CdTe, ZnS, (CdTe)1-xSex and (CdTe)1-xSex / ZnS have a polycrystalline structure, the C-V characteristic shows that the capacitance degrease by increasing the concentration (x) in reverse bias, while the I-V characteristic shows the current dark (Id) increase in forward and reverse bias by increasing (x) and the photocurrent (Iph) increase in reverse bias by increasing the concentration (x), the values of photocurrent are greater than from the values of the dark current for all concentrations.
Many researchers used different methods in their investigations to enhance the heat transfer coefficient, one of these methods is using porous medium. Heat transfer process inside closed and open cavities filled with a fluid-saturated porous media has a considerable importance in different engineering applications, such as compact heat exchangers, nuclear reactors and solar collectors. So, the present paper comprises a review on natural, forced, and combined convection heat transfer inside a porous cavity with and without driven lid. Most of the researchers on this specific subject studied the effect of many parameters on the heat transfer and fluid field inside a porous cavity, like the angle of inclination, the presenc
... Show MoreMany cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreIn this paper, we introduce the concept of Jordan –algebra, special Jordan –algebra and triple –homomorphisms. We also introduce Bi - –derivations and Annihilator of Jordan algebra. Finally, we study the triple –homomorphisms and Bi - –derivations on Jordan algebra.
An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreThe present study was carried out on forty eight epididymis of sexually mature dogs to elucidate light microscope features and the presence of testosterone receptors inside epididymis in different seasons. Twenty four dogs aged 3 years were used during the periods from 1/2/2015-1/2/2016. The epididymis were carefully dissected from the testis after orchidectomy operations and fixed, dehydrated, clarified and embedded in paraffin. Sections were stained with hematoxylin and eosin and periodic acid schiff. As well as, paraffin embedded cytoimmunochemistry technique was used for detection of testosterone receptors. Muscular coats showed no significant differences during different seasons or among segments. Epithelial heigh
... Show MoreGlobalization as phenomena has affected all aspects of life and reflected its impacts to the Arab world politically, economically, and culturally and became a vital field that related directly to our life. This field of searching needs as many studies and Academics as for employing the means that needed to face a national challenge which targeting the Arabic man Character in its ethics and values. This very important thing needs a very important reaction to face that challenge to protect the cultural ARABIC & ISLAMIC characteristics and to take care of education in all its levels and forms as it is an invincible fort. For that, this field has become as the priority of the studying and researches if the
... Show MoreSpeech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R
... Show More