Preferred Language
Articles
/
ihjtrZQBVTCNdQwCxR5D
Ag@WO3 core–shell nanocomposite for wide range photo detection
...Show More Authors

This study successfully synthesized high-performance photodetectors based on Ag-WO3 core–shell heterostructures using a simple and economical two-step pulsed laser ablation in water method and has investigated the electrical characteristics of the Ag@WO3 nanocomposite heterojunction. The Hall effect tests indicate that the synthesized Ag@WO3 exhibits n-type conduction with a Hall mobility of 1.25 × 103 cm2V-1S-1. Dark current–voltage properties indicated that the created heterojunctions displayed rectification capabilities, with the highest rectification factor of around 1.71 seen at a 5 V bias. A photodetector’s responsivity reveals the existence of two response peaks, which are situated in the ultraviolet and visible region. The photodetector demonstrates a rapid response time of less than 100 ms. The detectivity values for wavelengths of 350 nm and 490 nm were 35 × 1013 Jones and 28 × 1013 Jones, respectively. The n-Ag-WO3/n-Si photodetector achieved a maximum EQE of 11.5% in the ultraviolet wavelength when subjected to 3 V and illuminated with 350 nm (26 mW/cm2) light. The devices demonstrate rapid switching behavior with a rise time of 0.32 s and a fall time of 0.33 s. The time-dependent light response of a photodetector under illumination at 26 mW/cm2 is seen at a bias of 3 V. The light exhibits a rise and decay duration of 15 s, while the photocurrent gain is measured at 9µA. The photocurrent of devices exhibited a positive correlation with the incoming light intensity, suggesting that the junction has the potential to function as a photo detector. © The Author(s) 2024.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
Power dissipation and time of breakdown in AC discharge of argon at a low pressure in the frequency range 5-10 kHz
...Show More Authors

The influence of 5-10 kHz audio frequency on the power dissipation in ac discharge of argon gas was studied experimentally, at pressures 50-80 mTorr and electrodes separation 10 cm (pd range 0.5-0.8 Torr.
cm). The measurements have shown that the discharge behavior in the ac circuit is equivalent to a series RC circuit. It is observed that the variation curve of discharge power P with the frequency f is approximately has a Gaussian shape. It is also observed that the curve of Pm- pd is the inverse of Paschen curve, where Pm is the maximum power in the frequency range. The time of breakdown is estimated from the curve of P- f.

View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Intrusion Detection System Using Data Stream Classification
...Show More Authors

Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Applied Energy
Solidification enhancement with multiple PCMs, cascaded metal foam and nanoparticles in the shell-and-tube energy storage system
...Show More Authors

View Publication
Scopus (250)
Crossref (242)
Scopus Clarivate Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Plagiarism Detection Methods and Tools: An Overview
...Show More Authors

Plagiarism Detection Systems play an important role in revealing instances of a plagiarism act, especially in the educational sector with scientific documents and papers. The idea of plagiarism is that when any content is copied without permission or citation from the author. To detect such activities, it is necessary to have extensive information about plagiarism forms and classes. Thanks to the developed tools and methods it is possible to reveal many types of plagiarism. The development of the Information and Communication Technologies (ICT) and the availability of the online scientific documents lead to the ease of access to these documents. With the availability of many software text editors, plagiarism detections becomes a critical

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (17)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
Core Polarization Effects on the Inelastic Longitudinal Electron Scattering Form Factors of Ti 48,50 and Cr 52,54 nuclei
...Show More Authors

In this paper, inelastic longitudinal electron scattering form factors C2 and C4
transitions have been studied in Ti 48,50
and Cr 52,54
nuclei with the aid of shell
model calculations. The core polarization transition density was evaluated by
adopting the shape of Tassie model togther with the derived form of the ground state
two-body charge density distributions (2BCDD's). The following transitions have
been investigated; 0 2 2 2 1 1
   and 0 2 4 2 1 1
   of Ti 48 , 0 3 2 3 1 1
   and
0 3 4 3 1 1
   of Ti 50 , 0 2 2 2 1 1
   and 0 2 4 2 1 1
   of Cr 52 and
0 3 2 3 1 1
   and 0 3 4 3 1 1
   of Cr 54 nuclei. It is fou

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and

... Show More
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Cryptography with Dynamic DNA Depending on Edge Detection
...Show More Authors

Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Advances In Computing
A New Abnormality Detection Approach for T1-Weighted Magnetic Resonance Imaging Brain Slices Using Three Planes
...Show More Authors

Generally, radiologists analyse the Magnetic Resonance Imaging (MRI) by visual inspection to detect and identify the presence of tumour or abnormal tissue in brain MR images. The huge number of such MR images makes this visual interpretation process, not only laborious and expensive but often erroneous. Furthermore, the human eye and brain sensitivity to elucidate such images gets reduced with the increase of number of cases, especially when only some slices contain information of the affected area. Therefore, an automated system for the analysis and classification of MR images is mandatory. In this paper, we propose a new method for abnormality detection from T1-Weighted MRI of human head scans using three planes, including axial plane, co

... Show More
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Engineering
Practical comparation of the accuracy and speed of YOLO, SSD and Faster RCNN for drone detection
...Show More Authors

Convolutional Neural Networks (CNN) have high performance in the fields of object recognition and classification. The strength of CNNs comes from the fact that they are able to extract information from raw-pixel content and learn features automatically. Feature extraction and classification algorithms can be either hand-crafted or Deep Learning (DL) based. DL detection approaches can be either two stages (region proposal approaches) detector or a single stage (non-region proposal approach) detector. Region proposal-based techniques include R-CNN, Fast RCNN, and Faster RCNN. Non-region proposal-based techniques include Single Shot Detector (SSD) and You Only Look Once (YOLO). We are going to compare the speed and accuracy of Faster RCNN,

... Show More
View Publication Preview PDF
Crossref (13)
Crossref