In this work, wide band range photo detector operating in UV, Visible and IR was fabricated using carbon nanotubes (MWCNTs, SWCNTs) decorated with silver nanoparticles (Ag NPs). Silicon was used as a substrate to deposited CNTs/Ag NPs by the drop casting technique. Polyamide nylon polymer was used to coat CNTs/Ag NPs to enhance the photo-response of the detector. The electro-exploding wire technology was used to synthesize Ag NPs. Good dispersion of silver NPs achieved by a simple chemistry process on the surface of CNTs. The optical, structure and electrical characteristic of CNTs decorated with Ag NPs were characterized by X-Ray diffraction and Field Emission Scanning Electron Microscopy. X-ray diffraction patterns of Ag NPs exhibited 2θ values (38.1°,44.3°) corresponding to the Ag nanocrystal, while the XRD pattern of MWCNTs and SWCNTs /Ag NPs peaks appeared at 2θ = 26.2° corresponding to the (002) and at 2theta=44° which corresponds with miller indices (100) for CNTs and (200) for Ag NPs. The optical properties measured by UV-Vis. Spectroscopy. Broad and strong surface plasmon resonance (SPR) peak was detected at 420 nm, for Ag NPs. The absorption of CNTs/Ag NPs increased significantly from UV to near IR region (300-1000 nm). Ag NPs decorated CNTs without any impurities, according to field mission scanning electron microscopy examination, with typical particle sizes of (50-80nm) for Ag-NPs, 44nm for MWCNTs/Ag-NPs, and 30nm for SWCNTs/Ag NPs. ֹThe I-V characteristics at forward bias voltage (0.5-10) volt were studied. The figure of merits (responsivity, photocurrent gain, NEP and detectivity) after coating with polymer of the detector were measured in the dark and after illumination with UV LED (365 nm), Tungsten lamp (500-800 nm) and Laser diode (808 nm).
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreThe research aims to design a narrow-band frequency drive amplifier (1.5GHz -1.6GHz), which is used to boost the transmitter amplifier's input signal or amplify the GPS, GlONASS signals at the L1 band.
The Power Amplifier printed circuit board (PCB) prototype was designed using InGaP HBT homogeneous technology transistor and GaAs Heterojunction Bipolar Transistor (HBT) transistor. Two models have been compared; one of the models gave 16dB gain, and the other gave 23dB when using an input power signal (-15dBm). The PCB consumes 2.4W of power and has a physical dimension of 11 x 4 cm.
In this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
The ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi
... Show MorePrediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pr
... Show MoreAbstract
This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per
... Show MoreOpenStreetMap (OSM) represents the most common example of online volunteered mapping applications. Most of these platforms are open source spatial data collected by non-experts volunteers using different data collection methods. OSM project aims to provide a free digital map for all the world. The heterogeneity in data collection methods made OSM project databases accuracy is unreliable and must be dealt with caution for any engineering application. This study aims to assess the horizontal positional accuracy of three spatial data sources are OSM road network database, high-resolution Satellite Image (SI), and high-resolution Aerial Photo (AP) of Baghdad city with respect to an analogue formal road network dataset obtain
... Show MorePrediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressur
... Show More