DC planar sputtering system is characterized by varying discharge potential of (250-2000 volt) and Argon gas pressures of (3.5×10-2 – 1.5) mbar. The breakdown voltage for silver electrode was studied with a uniform electric field at different discharge distances, as well as plasma parameters. The breakdown voltage is a product of the Argon gas pressure inside the chamber and gab distance between the electrodes, represent as Paschen curve. The Current-voltage characteristics curves indicate that the electrical discharge plasma is working in the abnormal glow region. Plasma parameters were found from the current-voltage characteristics of a single probe positioned at the inter-cathode space. Typical values of the electron temperature and the electron density are in the range of (2.93 –5.3) eV and (10-16 -10-17) m-3 respectively.
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThe MTS-88. c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembly. It has the problem that long programs cannot be traced and tested efficiently. A simple error may cause all the code to be erased and the system to stop responding. Also, this system lacks the ability to be connected to the PC. The aim of this work is to modify the system to make it possible to be connected to the PC through the parallel port. This gives the capability to download long programs to the system after being developed in the PC. The 8255 Programmable Peripheral Interface available in the teaching system is interfaced to the parallel port and used as
... Show MoreToday many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of ECG signal such as Q,R,S, and T waves. The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
In this work, seven soil samples were brought brought to study and analyses the element concentrations from different southern regions of Iraq using laser-induced breakdown spectroscopy (LIBS) technique. It has been documented as an atomic emission spectroscopy (AES) technique. Laser-induced plasma utilized to analyze elements in materials (gases, liquids, and solids). In order to analyze elements in materials (gases, liquids, and solid). The Nd: YAG laser excitation source at 1064 nm with pulse width 9 ns is used to generate power density of 5.5 x 1012 MW/mm2, with optical spectrum in the range 320-740 nm. From this investigation, the soil sample analysis of the southern cities of Iraqi, it is concluded that the rich soil element of P, Si,
... Show MoreThis study was carried out in order to determine the toxic, mutagenic and antimutagenic effects for Mallow (Malva parviflora) in comparison to its mutagenic effect of Ultraviolet (UV) because it is consider physical mutagen by using parameters for the extract pri , with , post UV exposure by using bacterial system (G-system). The used system consisted of three isolates G3 Bacillus spp., G12 Arthrobacter spp. and G27 Brevibacterium spp.. The study depended on recording survival fraction (Sx) for studying the effects and induction of Streptomycin and Refampicin resistance mutants as a genetic markers.Water Extract was prepared from fresh and dry mallow leaves, stems, flowers and roots, in optimum concentration equal to (125µg/ml) which is
... Show MoreThe aim of this work is to evaluate concentrations of natural and artificial radionuclide in nine different samples of condiments from local markets. The concentrations of 238 U , 232 Th ,40k and 137Cs were measured by using gamma spectroscopy with a high- purity germanium detector. The concentrations of 238 U, 232 Th ,40k and 137Cs were found to be in a range of (21.4 - 91.13), (15.7 - 88.11) , (285.56 – 1100) and (5.1 - 27.5) Bq.kg-1 respectively. These concentrations are not hazardous to public health and the activities are within the allowed levels
This study aims to identify the concepts of financial crisis and its reasons of creation , also explain the effects of the accounting disclosure and the International Accounting Standards in current financial crisis, In addition to, indicate the role of accounting in the reform of the financial system from the impact of financial crisis.
The methodology of this study orientied to two main aspects, the first is an identifying approach through exploring the opinion of financial experts, the second aspect is based on an analytical approach to satisfy the requirements of experts to get there opi
... Show More