In the present work, the feasibility of formation near-ideal ohmic behavior of In/n-Si contact efficiently by 300 s duration Nd:YAG pulsed laser processing has been recognized. Several laser pulses energy densities have been used, and the optimal energy density that gives best results is obtained. Topography of the irradiated region was extensively discussed and supported with micrographic illustrations to determine the surface condition that can play the important role in the ohmic contact quality. I-V characteristics in the forward and reverse bias and barrier height measurements have been studied for different irradiated samples to determine the laser energy density that gives best ohmic behavior. Comparing the current results with published results, it is found that these results are competitive and meet the standards of good ohmic contact, specific contact resistance of 1.9 x 10-4 .cm2 has been obtained at 21.1 J.cm-2 laser energy density, which is the lowest value ever reported for In/n-Si.
Cowpea is a very important legume in Nigeria that is being utilized to Substitute high-cost animal protein for low-income people. The knowledge of some physical properties of various moisture contents is of utmost importance in the design of its handling and processing equipment and machinery, which is the aim of this work, which studied the physical properties of IT99K-573-1-1 (SAMPEA14) variety of Cowpea within 8.77 to 21.58 % db moisture content. The properties studied include Major, Intermediate, and Minor diameters, Sphericity, Surface area, Specific gravity, Volume, Bulk density, 50-tap density, 100-tap density, 1250-tap density, seed mass, Angle of repose, Geometric mean diameter, and Arithmetic mean diameter. The
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThe development of human resources training programs can assist in agreat deal in creating products of high quality with quantitive advantage for the economicunit;through the sale of products by prices higher of the peer products price in the arket,or decreasing production costs which lead into increusing the unet profits. for these reasons, the human resources have got great importance for their great role in any economy,and they havestarled to consentrate on accounting these resource.From this point of view, this research has handied human resources accounting and their effect on quality costs. In(MID-Refinery Company),quality costs are determined ,then we have larified the reality of training and development in the o
... Show MoreIn this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreIn this paper, preliminary test Shrinkage estimator have been considered for estimating the shape parameter α of pareto distribution when the scale parameter equal to the smallest loss and when a prior estimate α0 of α is available as initial value from the past experiences or from quaintance cases. The proposed estimator is shown to have a smaller mean squared error in a region around α0 when comparison with usual and existing estimators.
This study aims to determine the effect of x-ray radiation resulting from solar flares in high-frequency radio wave communications through the ionosphere and to study the radio blackout events that occur over Iraq, located within (38,28) latitude, and (38,49) longitude. Using X-ray data during strong X flares and radio wave absorption data across the D ionosphere for 10 years from 2012 to 2021. The study concluded that there were 43 events of x-flare, most of which were during years of high solar activity. All of these flares produced X-rays that caused a radio blackout, R3 and only 13 events affected Iraq.