Alloys of InxSe1-x were prepared by quenching technique with
different In content (x=10, 20, 30, and 40). Thin films of these alloys
were prepared using thermal evaporation technique under vacuum of
10-5 mbar on glass, at room temperature R.T with different
thicknesses (t=300, 500 and 700 nm). The X–ray diffraction
measurement for bulk InxSe1-x showed that all alloys have
polycrystalline structures and the peaks for x=10 identical with Se,
while for x=20, 30 and 40 were identical with the Se and InSe
standard peaks. The diffraction patterns of InxSe1-x thin film show
that with low In content (x=10, and 20) samples have semi
crystalline structure, The increase of indium content to x=30
decreases degree of crystallinity and further increase of indium
content to x=40 leads to convert structure to amorphous. Increase of
thickness from 300 to 700nm increases degree of crystallinity for all
indium content. Transmittance measurements were used to calculate
refractive index n and the extinction coefficient k using Swanepole’s
method. The optical constants such as refractive index (n), extinction
coefficient (k) and dielectric constant (εr, εi) increases for low indium
content samples and decreases for high indium content samples,
while increase of thickness increases optical constants for all x
values. The oscillator energy E0, dispersion energy Ed, and other
parameters have been determined by Wemple - DiDomenico single
oscillator approach.
In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreSelf-criticism is that a person confronts himself with his mistakes in order to reform and develop them for the better, motivate them and inspire hope in them to push them forward and continue to give in this life. The Holy Qur’an teaches us, through the models it cited in its verses, that this is through repentance, a feeling of remorse, and a determination to leave mistakes, and quit disobedience and sins, etc., and all this is done through constructive criticism, and at the same time, one must realize his strengths. , in order to succeed in preserving it and employing it in the right path that pleases God, His Messenger, himself and his society. This has been explained through an introduction, two topics and a conclusion, and God is t
... Show MoreHumans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.
Receipt date:9/1/2020 accepted date:11/24/2020 Publication date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
the Nile River and the Renaissance Dam is one of the most prominent factors that had an important role in the nature of relations between Egypt - Ethiopia, as they contributed to building a relationship that has common characteristics through the nature of the i
... Show MoreDue to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and
... Show More