The characterization of ZnO and ZnO:In thin films were confirmed by spray pyrolysis technique. The films were deposited onto glass substrate at a temperature of 450°C. Optical absorption measurements were also studied by UV-VIS technique in the wavelength range 300-900 nm which was used to calculate the optical constants. The changes in dispersion and Urbach parameters were investigated as a function of In content. The optical energy gap was decreased and the wide band tails were increased in width from 616 to 844 eV as the In content increased from 0wt.% to 3wt.%. The single–oscillator parameters were determined also the change in dispersion was investigated before and after doping.
Nano crystalline copper sulphide (Cu2S) thin films pure and 3% Bi doped were deposited on glass substrate by thermal evaporation technique of thickness 400±20 nm under a vacuum of ~ 2 × 10− 5 mbar to study the influence of annealing temperatures ( as-deposited, and 573) K on structural, surface morphology and optical properties of (Cu2S and Cu2S:3%Bi). (XRD) X-ray diffraction analysis showed (Cu2S and Cu2S:3%Bi) films before and after annealing are polycrystalline and hexagonal structure. AFM measurement approves that (Cu2S and Cu2S:3%Bi) films were Nano crystalline with grain size of (105.05-158.12) nm. The optical properties exhibits good optical absorption for Cu2S:3%Bi films. Decreased of optical band gap from 2.25 to 2 eV after dop
... Show MoreDarifenacin hydrobromide (DH) is the more recent uroselective M3 receptor antagonist for treating uncomplicated overactive bladder (OAB). This study was aimed to formulate DH as fast dissolving buccal films (FDBFs) using a solvent casting method to enhance patient’s compliance.
Films were prepared by using polyvinyl alcohol (PVA) as a film forming polymer. Different types and concentrations of superdisintegrants (croscarmellose sodium, sodium starch glycolate, indion 414) were used to select the best formula by studying the physicochemical properties of the films, disintegration time (DT) and percent drug release.
&nb
... Show MorePure SnSe thin film and doped with S at different percentage (0,3,5,7)% were deposited from alloy by thermal evaporation technique on glass substrate at room temperature with 400±20nm thickness .The influences of S dopant ratio on characterization of SnSe thin film Nano crystalline was investigated by using Atomic force microscopy(AFM), X-ray diffraction (XRD), energy dispersive spectroscopy (EDS), Hall Effect measurement, UV-Vis absorption spectroscopy to study morphological, structural, electrical and optical properties respectively .The XRD showed that all the films have polycrystalline in nature with orthorhombic structure, with preferred orientation along (111)plane .These films was manufactured of very fine crystalline size in the ra
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show More