A numerical computation for determination transmission coefficient and resonant tunneling energies of multibarriers heterostructure has been investigated. Also, we have considered GaN/Al0.3Ga0.7N superlattice system to estimate the probability of resonance at specific energy values, which are less than the potential barrier height. The transmission coefficient is determined by using the transfer matrix method and accordingly the resonant energies are obtained from the T(E) relation. The effects of both well width and number of barriers (N) are observed and discussed. The numbers of resonant tunneling peaks are generally increasing and they become sharper with the increasing of N. The resonant tunneling levels are shifted inside the well by increasing the well width and vice versa. These features and the transmission coefficient as a function of incident energetic particles play an important role in fabrication of high speed devices and a good factor for determination the peak-to-valley ratio of resonant tunneling devices respectively.
Disasters, crises and wars are a serious and unforeseen threat. The capacity of the early warning system to monitor such crises is therefore crucial. The ability to make quick decisions in a short time is necessary to prevent crises from occurring. Here, the role and effectiveness of the early warning system emerges through its ability to monitor, record and analyze signals. It can also be evidenced by its ability to immediately convey these indicators to the concerned authorities to take measures that ensure these conflicts and disasters do not worsen. The system’s ability to detect disasters and crises, identify the crisis and its type, and use the scientific method and common sense to deal with it is something that contributes to findi
... Show MoreThe objective of this study is to determine the extent to which the determinants of organizational support contributed to enhancing the mental status of banking services in a number of banks in Dohuk governorate in order to diagnose the correlation between the perceived organizational support and the mental status of services. Availability in the environment of banks and to enhance the mental position from the point of view of customers as the main hypotheses focused on the nature of the relationship between the dimensions of research among them has been tested these hypotheses using statistical and descriptive methods have been The study concluded that the contribution of organizational support, which is
... Show MoreAtmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geom
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreIn this work, the design and implementation of a smart energy metering system has been developed. This system consists of two parts: billing center and a set of distributed smart energy meters. The function of smart energy meter is measuring and calculating the cost of consumed energy according to a multi-tariff scheme. This can be effectively solving the problem of stressing the electrical grid and rising consumer awareness. Moreover, smart energy meter decreases technical losses by improving power factor. The function of the billing center is to issue a consumer bill and contributes in locating the irregularities on the electrical grid (non-technical losses). Moreover, it sends the switch off command in case of the consumer bill is not
... Show More