Preferred Language
Articles
/
ijp-225
Thickness and gamma-ray effect on physical properties of CdO thin films grown by pulsed laser deposition
...Show More Authors

Polycrystalline Cadmium Oxide (CdO) thin films were prepared
using pulsed laser deposition onto glass substrates at room
temperature with different thicknesses of (300, 350 and 400)nm,
these films were irradiated with cesium-137(Cs-137) radiation. The
thickness and irradiation effects on structural and optical properties
were studied. It is observed by XRD results that films are
polycrystalline before and after irradiation, with cubic structure and
show preferential growth along (111) and (200) directions. The
crystallite sizes increases with increasing of thickness, and decreases
with gamma radiation, which are found to be within the range
(23.84-4.52) nm and (41.44-4.974)nm before and after irradiation for
thickness 350nm and 400nm respectively, The dislocation density,
microstrain and number of crystallites per unit surface area,
decreases with increasing of thickness, while they increases with
gamma radiation. From the atomic force microscope (AFM), the
grain size of CdO films decrease from 96.69nm before radiation to
89.49 nm after gamma radiation and RMS roughness increases for
the irradiated sample from 4.26nm to 4.8nm, increase in the surface
roughness is advantages as it increases the efficiency of the CdO
solar cells. The optical properties for thin CdOfilms with different
thickness before and after gamma irradiation have been determined
and reveals direct energy gap. It is decrease with the increase of
thickness, while it is increase after gamma irradiation. These films a
promising candidate for the window layer in solar cells and other
possible optoelectronic application.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Applying Cognitive Methodology in Designing On-Line Auto-Tuning Robust PID Controller for the Real Heating System
...Show More Authors

A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 12th International Conference On Developments In Esystems Engineering (dese)
Structural Rehabilitation on Continuous Post-Tensioned Prestressed Concrete Box-Girder Bridge Exposed to Explosion: A Case Study
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Sep 29 2022
Journal Name
World Journal Of Clinical Infectious Diseases
Five-year retrospective hospital-based study on epidemiological data regarding human leishmaniasis in West Kordofan state, Sudan
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Dec 12 2017
Journal Name
Al-khwarizmi Engineering Journal
Model Reference Adaptive Control based on a Self-Recurrent Wavelet Neural Network Utilizing Micro Artificial Immune Systems
...Show More Authors

Abstract 

This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
مؤتمر النسوي الثالث / كلية العلوم للبنات
Synthesis , Characterization and study of Biological Activities of Mixed Ligand-Complexes of Saccharin and Trimethoprim with Ni(II),Co(II),Cu(II), Hg(II) and Cd(II)
...Show More Authors

Publication Date
Tue Apr 03 2018
Journal Name
International Journal Of Science And Research (ijsr)
Synthesis, Spectral of Azo Dyes Complexes with Ni (II) and Cu (II) and Their Industrial and Bacteriological Application
...Show More Authors

Azo dye ligand was produced by coupling the diazonium salt of 4aminoantipyrine with 2, 4-dimethylphenol. The structure of 1 azo compound was someone by elemental analyses, HNMR, FT-IR and UV-Vis spectroscopic mechanics. Metal complexes of nickel (II) and copper (II) have been performed and depicted. The formation of complexes has been identified by using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectral process as well as, conductivity and magnetic properties quantifications. The nature of the complexes formed were studied succeed the mole ratio and continuous variation methods, Beer's law followed over a concentration 4 4 scope (1×10- - 3×10- M). High molar absorbtivity of the complex solutions were observed. Analytica

... Show More