Alloys of InxSe1-x were prepared by quenching technique with
different In content (x=10, 20, 30, and 40). Thin films of these alloys
were prepared using thermal evaporation technique under vacuum of
10-5 mbar on glass, at room temperature R.T with different
thicknesses (t=300, 500 and 700 nm). The X–ray diffraction
measurement for bulk InxSe1-x showed that all alloys have
polycrystalline structures and the peaks for x=10 identical with Se,
while for x=20, 30 and 40 were identical with the Se and InSe
standard peaks. The diffraction patterns of InxSe1-x thin film show
that with low In content (x=10, and 20) samples have semi
crystalline structure, The increase of indium content to x=30
decreases degree of crystallinity and further increase of indium
content to x=40 leads to convert structure to amorphous. Increase of
thickness from 300 to 700nm increases degree of crystallinity for all
indium content. Transmittance measurements were used to calculate
refractive index n and the extinction coefficient k using Swanepole’s
method. The optical constants such as refractive index (n), extinction
coefficient (k) and dielectric constant (εr, εi) increases for low indium
content samples and decreases for high indium content samples,
while increase of thickness increases optical constants for all x
values. The oscillator energy E0, dispersion energy Ed, and other
parameters have been determined by Wemple - DiDomenico single
oscillator approach.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreCuO-ZnO-Al2O3 catalyst was prepared in the ratios of 20:30:50 respectively, using the coprecipitation method of Cu, Zn and Al carbonates from their nitrate solutions dissolved in distilled water by adding sodium bicarbonate as precipitant.The catalyst was identified by XRD and quantitatively analysis to determine the percentages of its components using flame atomic absorption technique. Also the surface area was measured by BET method. The activity of this prepared catalyst was examined through the oxidation of ethanol to acetaldehyde which was evaluated by gas chromatography.
RNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreVol. 6, Issue 1 (2025)
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More