Preparation of superposed thin film (CdTe)1-xSex / ZnS) with concentration of (x= 0.1, 0.3, 0.5) at a temperature of substrate (Ts= 80 0C) by using Thermal Vacuum Evaporation System. The measurement of X-ray diffraction shows that the compounds CdTe, ZnS, (CdTe)1-xSex and (CdTe)1-xSex / ZnS have a polycrystalline structure, the C-V characteristic shows that the capacitance degrease by increasing the concentration (x) in reverse bias, while the I-V characteristic shows the current dark (Id) increase in forward and reverse bias by increasing (x) and the photocurrent (Iph) increase in reverse bias by increasing the concentration (x), the values of photocurrent are greater than from the values of the dark current for all concentrations.
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreA solar updraft tower power plant (solar tower) is a solar thermal power plant that utilizes a combination of solar
air collector and central updraft tube to generate an induced convective flow which drives pressure staged turbines to generate electricity.
This paper presents practical results of a prototype of a solar chimney with thermal mass, where the glass surface is replaced by transparence plastic cover. The study focused on chimney's basements kind effect on collected air temperatures. Three basements were used: concrete, black concrete and black pebbles basements. The study was conducted in Baghdad from August to November 2009.
The results show that the best chimney efficiency attaine
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreBackground: The repair of bone defects remains a major clinical orthopaedic challenge. Bone is a highly vascularised tissue reliant on the close spatial and temporal connection between blood vessels and bone cells to maintain skeletal integrity. This study aimed to study the efficacy of Panax ginseng as a osteoinducer in tibia of rat and as a stimulator for bone healing and to study the immunohistochemical expression of osteonectin as bone formation markers in experimental and control groups during bone healing. Material and method: : In this study thirty albino male rats , weighting (200-300) gram ,aged (2-3) months ,will be used under control conditions of temperature ,drinking and food consumption. The animals will subject for an
... Show MoreDue to the importance of the extraction process in many engineering and medical industries, in addition to great interest in medicinal plants, in this research, microwave-assisted extraction has been applied to extract some active compounds from Rosmarinus officinalis leaves. The optimal extraction conditions were then determined by calculating the ratio and extraction efficiency. The process has also been described through kinetic study by applying five kinetic models, the Hyperbolic diffusion model, Power low model, the First order reaction model, Elovich's model, and Fick's second law diffusion model and determining their compatibility with the studies operation, and determining the kinetic constants for each model. The result
... Show MoreThis paper describes the digital chaotic signal with ship map design. The robust digital implementation eliminates the variation tolerance and electronics noise problems common in analog chaotic circuits. Generation of good non-repeatable and nonpredictable random sequences is of increasing importance in security applications. The use of 1-D chaotic signal to mask useful information and to mask it unrecognizable by the receiver is a field of research in full expansion. The piece-wise 1-D map such as ship map is used for this paper. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. Rec
... Show MoreTillage tools are subject to friction and low-stress abrasive wear processes with the potential deterioration of the desired soil quality, loss of mechanical weed efficacy, and downtime for replacing worn tools. Limited experimental methods exist to quantify investigate the effect of wear-resistant coatings on shape parameters of soil-engaging tools. ASTM standard sand/rubber wheel abrasion and pin-on-disk tests are not able to simulate wear characteristics of the complex shape of the tillage tools. Even though the tribology of tillage tools can be realistic from field tests, tillage wear tests under field conditions are expensive and often challenging to generate repeatable engineeri
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More