A metal-assisted chemical etching process employing p-type silicon wafers with varied etching durations is used to produce silicon nanowires. Silver nanoparticles prepared by chemical deposition are utilized as a catalyst in the formation of silicon nanowires. Images from field emission scanning electron microscopy confirmed that the diameter of SiNWs grows when the etching duration is increased. The photoelectrochemical cell's characteristics were investigated using p-type silicon nanowires as working electrodes. Linear sweep voltammetry (J-V) measurements on p-SiNWs confirmed that photocurrent density rose from 0.20 mA cm-2 to 0.92 mA cm-2 as the etching duration of prepared SiNWs increased from 15 to 30 min. The conversion efficiency (ƞ) was 0.47 for p-SiNWs prepared with a 15-minute etching time and 0.75 for p-SiNWs prepared with a 30-minute etching time. The cyclic voltammetry (CV) experiments performed at various scan rates validated the faradic behavior of p-SiNWS prepared for 15 and 30 min of etching. Because of the slow ion diffusion and the increased scanning rate, the capacitance decreased with increasing scanning rate. Mott-Schottky (M-S) investigation showed a significant carriers concentration of 3.66×1020 cm-3. According to the results of electrochemical impedance spectroscopy (EIS), the SiNWs photocathode prepared by etching for 30 min had a charge transfer resistance of 25.27 Ω, which is low enough to enhance interfacial charge transfer.
Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreThe energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.
As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreDue to the easily access to the satellite images, Google Earth (GE) images have become more popular than other online virtual globes. However, the popularity of GE is not an indication of its accuracy. A considerable amount of literature has been published on evaluating the positional accuracy of GE data; however there are few studies which have investigated the subject of improving the GE accuracy. In this paper, a practical method for enhancing the horizontal positional accuracy of GE is suggested by establishing ten reference points, in University of Baghdad main campus, using different Global Navigation Satellite System (GNSS) observation techniques: Rapid Static, Post-Processing Kinematic, and Network. Then, the GE image for the study
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show More