Preferred Language
Articles
/
ihjtrZQBVTCNdQwCxR5D
Ag@WO3 core–shell nanocomposite for wide range photo detection
...Show More Authors

This study successfully synthesized high-performance photodetectors based on Ag-WO3 core–shell heterostructures using a simple and economical two-step pulsed laser ablation in water method and has investigated the electrical characteristics of the Ag@WO3 nanocomposite heterojunction. The Hall effect tests indicate that the synthesized Ag@WO3 exhibits n-type conduction with a Hall mobility of 1.25 × 103 cm2V-1S-1. Dark current–voltage properties indicated that the created heterojunctions displayed rectification capabilities, with the highest rectification factor of around 1.71 seen at a 5 V bias. A photodetector’s responsivity reveals the existence of two response peaks, which are situated in the ultraviolet and visible region. The photodetector demonstrates a rapid response time of less than 100 ms. The detectivity values for wavelengths of 350 nm and 490 nm were 35 × 1013 Jones and 28 × 1013 Jones, respectively. The n-Ag-WO3/n-Si photodetector achieved a maximum EQE of 11.5% in the ultraviolet wavelength when subjected to 3 V and illuminated with 350 nm (26 mW/cm2) light. The devices demonstrate rapid switching behavior with a rise time of 0.32 s and a fall time of 0.33 s. The time-dependent light response of a photodetector under illumination at 26 mW/cm2 is seen at a bias of 3 V. The light exhibits a rise and decay duration of 15 s, while the photocurrent gain is measured at 9µA. The photocurrent of devices exhibited a positive correlation with the incoming light intensity, suggesting that the junction has the potential to function as a photo detector. © The Author(s) 2024.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Aug 01 2018
Journal Name
Engineering And Technology Journal
A Proposed Method for the Sound Recognition Process
...Show More Authors

View Publication
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Theoretical Study of Thermal Cracking For Acenaphthylene Molecule
...Show More Authors

Density Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
New Viscosity Correlation for Different Iraqi Oil Fields
...Show More Authors

 

Viscosity is one of the most important governing parameters of the fluid flow, either in the porous media or in pipelines. So it is important to use an accurate method to calculate the oil viscosity at various operating conditions. In the literature, several empirical correlations have been proposed for predicting crude oil viscosity. However, these correlations are limited to predict the oil viscosity at specified conditions. In the present work, an extensive experimental data of oil viscosities collected from different samples of Iraqi oil reservoirs was applied to develop a new correlation to calculate the oil viscosity at various operating conditions either for dead, satura

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Nov 04 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Determination of Quality of Life for Adult Patients
...Show More Authors

Objective: The study aimed to determine quality of life domains for adult patients with limbs loss and to identify
the association between quality of life domains and demographic characteristics and medical information.
Methodology: A descriptive study was carried out at Baghdad artificial limb center, Al-Salam medical
rehabilitation center, Al-Ghadeer medical rehabilitation center and the rheumatoid and medical rehabilitation
center for the period from September 2007 to April 2008. A purposive ''non- probability'' sample of (200)
patients with limbs loss. Questionnaire form was constructed for the purpose of the study. Data were collected
through the application of the questionnaire and interview technique. Data were a

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
Fractal and its implications for industrial product design
...Show More Authors

The current research dealt with the rapid development of industrial product design in recent times, and this development in the field of design led to the emergence of modern trends in many terms and theories to direct greater interest in the cognitive foundations of design and its relationship with the components of other natural sciences, and despite the impressive technological development, nature remains With its content of formative values and structural dimensions, it is the first source of inspiration and the source of all modern mathematical sciences and theories, as God made them tend towards organization to continue to provide us with endless inspiration. Hence, the fractional one, which is an important part of dedicating the d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Effective Rules for Building and Securing of Blogs
...Show More Authors

Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 15 2022
Journal Name
Mest Journal
SMARTPHONE APPLICATION FOR MANAGING MISSED AND FOUND BELONGINGS
...Show More Authors

Nowadays, due to our everyday stress and current stressful lifestyle, the loss of items appears a frequent issue and may be very inconvenient. In this regard, until the IoT becomes part of everyday life, we can use the software as an efficient tool to assist a person's searching, verifying, and finding lost belongings. This paper presents an Android-based application that we proposed and implemented to help users find lost items. Utilizing this software will enable the subscriber to record his request to the relevant authority. In addition, a special section offers to insert a contact telephone number or email to communicate between the person who found the item and the person who lost it. During testing, among other services, the p

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Jan 02 2025
Journal Name
Academic Journal Of Nawroz University (ajnu)
Visual Understanding in Education for sustainable communication skill
...Show More Authors

Students in the twenty-first century need to find innovative ways to satisfy and respond to these learning requirements since they live in a visible world that is continuously surrounded by visual, technological stimuli. This is especially true of higher education. In order promote advancements in sustainable awareness, the project aims to include visual understanding in education (VUE) in higher education communication skills. An interview has been employed as a tool to accomplish the study's goal. The idea of Visual Understanding in Education (VUE) is one of the many novel or modern ways that has produced remarkable outcomes in a wide range of specialized sectors. Teachers may spread lessons of responsibility and consciousness by being aw

... Show More
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref