At a temperature of 300 K, a prepared thin film of Ag doped with different ratios of CdO (0.1, 0.3, 0.5) % were observed using pulse laser deposition (PLD). The laser, an Nd:YAG in ?=1064 nm, used a pulse, constant energy of 600 mJ ,with a repetition rate of 6 Hz and 400 pulses. The effect of CdO on the structural and optical properties of these films was studied. The structural tests showed that these films are of a polycrystalline structure with a preferred orientation in the (002) direction for Ag. The grain size is positively correlated with the concentration of CdO. The optical properties of the Ag :CdO thin film we observed included transmittance, absorption coefficient, and the energy gap in the wavelength range of 300-1100
... Show MoreNano-silver oxide thin films with high sensitivity for NH3 gas were deposited on glass substrates by the chemical bath deposition technique. The preparations were made under different values of pH and deposition time at 70áµ’ C, using silver nitrate AgNO3 and triethanolamine. XRD analysis showed that all thin films were
polycrystalline with several peaks of silver oxides such as Ag2O, AgO and Ag3O4, with an average crystallite size that ranged between 31.7 nm and 45.8 nm, depending on the deposition parameters. Atomic force microscope (AFM) technique illustrated that the films were homogenous with different surface roughness and the
grain size ranged between 55.69 nm and 86.23 nm. The UV-Vis spectrophotometer showed that the op
The current study examined the use of Sansevieria plant leaves extract as an environmentally acceptable, inexpensive, and safe green approach for creating titanium dioxide nanoparticles (NPs). Batch studies have been used to test the particles' capacity to bind to the azo dye congo red (CR), which has been adsorbed from its aqueous solution. The effects of many factors, including the weight of TiO2 NPs, the contact duration to reach equilibrium, the concentration of CR, temperature, and pH, have been investigated. Both the Freundlich and Langmuir models were used to analyze experimental results. According to the high values of the Freundlich model's correlation coefficient R2, it is discovered that th
... Show MoreThe researchers have a special interest in studying Markov chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one of the ministries. Results are analyzed by applying Maximum likelihood estimation and Ordinary least squares methods resulting
... Show MoreHome New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreRecently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show More