This paper reports on the laser emission properties of the BBQ dye in poly (methyl meth-acrylate)(PMMA). This host material combines the advantages of an organic environment for dye with the thermoptical mechanical properties of an organic dye. A BBQ dye solid solution in PMMA polymer. A nitrogen laser in untuned laser cavity has pumped thin films. We developed the concentration and the thickness to get high efficiency. The laser efficiency had been increased from 7% at thickness 1.5 m to 16.5% at thickness 3.5m, and from 1% to 10% when concentration increased from 1x10-5M to 1x10-3 M
The effect of heat treatment using different annealing temperatures on optical properties of bulk heterojunction blend (BHJ) Alq3: C60 thin films which are fabricated by the spin coating technique were investigated in this study. The films have been coated on a glass substrate with speed of 2000 rpm for one min and treated with different annealing temperature (373, 423 and 473) K under vacuum. The optical properties and the chemical bonds structure of blends as-deposited and heat treated have been studied by UV-Vis spectroscopic and Fourier Transform-Infra Red (FTIR) measurements respectively. The results of UV visible show that the optical energy gap decreasing with increasing the annealing temperature for the ratio (100:1) while decrea
... Show MoreIn this study, the acid-alkaline transesterification of refined coconut seed oil (RCOSO) to fatty acid methyl ester was followed by the production of a trimethylolpropane-based thermosensitive biolubricant using potassium hydroxide, and its physicochemical characteristics were evaluated. The American Standard Test for Materials (ASTM) was employed to ascertain the biolubricant's pour point and index of viscosity, which were found to be -4 oC and 283.75, respectively. The opposite connection between lubricant viscosity and temperature was shown by the measured viscosities at varied transesterification to be transformed into biodiesel. Following this, a biolubricant was created by further transesterifiedtemperature. The ester gr
... Show MoreUsed cooking oil was undergoing trans-esterification reaction to produce biodiesel fuel. Method of production consisted of pretreatment steps, trans-esterification, separation, washing and drying. Trans-esterification of treated oils was studied at different operation conditions, the methanol to oil mole ratio were 6:1, 8:1, 10:1, and 12:1, at different temperature 30, 40, 50, and 60 º C, reaction time 40, 60, 80, and 120 minutes, amount of catalyst 0.5, 1, 1.5, and 2 wt.% based on oil and mixing speed 400 rpm. The maximum yield of biodiesel was 91.68 wt.% for treated oils obtained by trans-esterification reaction with 10:1 methanol to oil mole ratio, 60 º C reaction temperature, 80 minute reactio
... Show MoreThe present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.
Face detection is one of the important applications of biometric technology and image processing. Convolutional neural networks (CNN) have been successfully used with great results in the areas of image processing as well as pattern recognition. In the recent years, deep learning techniques specifically CNN techniques have achieved marvellous accuracy rates on face detection field. Therefore, this study provides a comprehensive analysis of face detection research and applications that use various CNN methods and algorithms. This paper presents ten of the most recent studies and illustrate the achieved performance of each method.
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MorePredicting the network traffic of web pages is one of the areas that has increased focus in recent years. Modeling traffic helps find strategies for distributing network loads, identifying user behaviors and malicious traffic, and predicting future trends. Many statistical and intelligent methods have been studied to predict web traffic using time series of network traffic. In this paper, the use of machine learning algorithms to model Wikipedia traffic using Google's time series dataset is studied. Two data sets were used for time series, data generalization, building a set of machine learning models (XGboost, Logistic Regression, Linear Regression, and Random Forest), and comparing the performance of the models using (SMAPE) and
... Show MoreSpeech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show More