In this work we present a detailed study on anisotype nGe-pSi heterojunction (HJ) used as photodetector in the wavelength range (500-1100 nm). I-V characteristics in the dark and under illumination, C-V characteristics, minority carriers lifetime (MCLT), spectral responsivity, field of view, and linearity were investigated at 300K. The results showed that the detector has maximum spectral responsivity at λ=950 nm. The photo-induced open circuit voltage decay results revealed that the MCLT of HJ was around 14.4 μs
Recent research has examined the improvement of physical and dielectric properties of BaTiO3 ceramic material by small addition of excess TiO2 or BaCO3. The prepared samples sintered at different temperatures and varying soaking time. The results show that increasing the sintering temperature within 1350°C and soaking time of 10 hrs give better electrical and physical properties, which indicate the reaction is complete at higher temperature and period.
In this work; copper oxide films (CuO) were fabricated by PLD. The films were analyzed by UV-VIS absorption spectra and their thickness by using profilometer. Pulsed Nd:YAG laser was used for prepared CuO thin films under O2 gas environment with varying both pulse energy and annealing temperature. The optical properties of as-grown film such as optical transmittance spectrum, refractive index and energy gap has been measured experimentally and the effects of laser pulse energy and annealing temperature on it were studied. An inverse relationship between energy gap and both annealing temperature and pulse energy was observed.
Duration of each developmental stage of the house dust mite Dermatophagoides pteronyssinus together with the mortality percentage were observed at a combination of five different temperatures namely 20C°, 22.5C°, 25C°, 27.5C° and 30C° and four different humidities namely 55%, 75%, 85% and 95% r. h. Results showed that temperature had the greatest effect on the life cycle period. The higher the temperature the shorter the life cycle was aid versa verea. On the other hand, humidity seems to be less effectiveness, though at the higher temperature and humidity no development was occured. Mortality among all temperatures and humidities appeared nearly the same, but at higher temperature and higher humidity and because of mould g
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre
... Show More