This paper demonstrates the spatial response uniformity (SRU) of two types of heterojunctions (CdS, PbS /Si) laser detectors. The spatial response nonuniformity of these heterojunctions is not significant and it is negligible in comparison with p+- n silicon photodiode. Experimental results show that the uniformity of CdS /Si is better than that of PbS /Si heterojunction
Ag nanoparticles were prepared using Nd:YAG laser from Ag matel in distilled water using different energies laser (100 and 600) mJ using 200 pulses, and study the effect of the preparation conditions on the structural characteristics of and then study the effect of nanoparticles on the rate of killing the two types of bacteria particles (Staph and E.coli). The goal is to prepare the nanoparticle effectively used to kill bacteria.
In this study ZnS thin film was prepared by using thermal evaporation vacuum technique under the pressure (10-6) Torr on glass substrate at room temperature and annealing at 523 K Samples were irradiated to CO2 laser of power (1 watt) and wave length (10.6) μm at distance 10 cm from the source during (5 sec). The absorbance spectra was recorded by using UV-visible spectrophotometer and used to calculated some of optical properties investigated including their transmittance, reflectance spectra, energy gap, and extinction coefficient. From the result of thin films samples at room temperature and at 523 K, we conclude that the irradiation by laser causes a decrease in the transmittance and increasing in reflection and extinction coeffic
... Show MoreIn this study, (50–110 nm) magnetic iron oxide (α-Fe2O3) nanoparticles were synthesized by pulsed laser ablation of iron target in dimethylformamide (DMF) and sodium dodecyl sulfate (SDS) solutions. The structural properties of the synthesized nanoparticles were investigated by using Fourier Transform Infrared (FT-IR) spectroscopy, UV–VIS absorption, scanning electron microscopy (SEM), atomic force microscopy (AFM), and X-ray diffraction (XRD). The effect of laser fluence on the characteristics of these nanoparticles was studied. Antibacterial activities of iron oxide nanoparticles were tested against Gram-positive; Staphylococcus aureus and Gram-negative; Escherichia coli, Pseudomonas aeruginosa and Serratia marcescens. The results sh
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show More