In this work Study effect of annealing temperature on the Structure
of a-Se and electrical properties of a-Se/c-Si hetrojunction have been
studied.The hetrojunction fabricated by deposition of a-Se film on c-
Si using thermal evaporation.
Electrical properties of a-Se/ c-Si heterojunction include I-V
characteristics, in dark at different annealing temperature and C-V
characteristics are considered in the present work.
C-V characteristics suggested that the fabricated diode was
abrupt type, built in potential determined by extrapolation from
1/C2-V curve. The built - in potential (Vbi) for the Se/ Si System
was found to be increase from 1.21 to 1.62eV with increasing of
annealing temperature
The research problem lies in: The use of positive and negative flexibility exercises to develop the special strength of the 400m hurdles player, that some young people face weakness and a problem in performance, which requires the need to prepare special exercises for physical and skill numbers using the types of exercises that have resilient strength, flexibility and have the effect on developing and determining the level of physical and skill performance. To develop 400m hurdles, special strength, explosive power and the characteristic velocity of arms and legs. Research aims: 1. Preparing positive and negative flexibility exercises to develop the special force and the effectiveness of 400m youth barriers. 2. Identify the effect of exerci
... Show MorePurpose A diagnosis of tuberculosis (TB) of the head and neck has been a dilemma for clinicians, because the clinical and pathologic features tend to mimic different pathologies. Our study aimed to identify the demographic, clinical, and pathologic features of head and neck TB to help healthcare providers in the early detection of the disease. Materials and Methods We performed a retrospective analysis using the medical archives at the pathology laboratory. Twenty-one patients with a clinical and pathologic diagnosis of head and neck TB were identified from 2010 to 2019. Results The age distribution was broad, with 28.5% of the patients younger than 15 years old. Seven patients had oral TB, with the most common sites affected the labial ves
... Show MoreArtificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection
... Show MoreNi2O3 nanomaterial, a phase of nickel oxide, is synthesized by a simple chemical process. The pure raw materials used in the present process were nickel chloride hexahydrate NiCl2.6H2O and potassium hydroxide KOH by utilizing temperature at 250 oC for 2 hour. The structural, morphological and optical properties of the synthesized specimens of Ni2O3 were investigated employing diverse techniques such as XRD, AFM, SEM and UV-Vis, respectively. The XRD technique confirms the presence of Ni2O3 nanomaterial with crystal size of 57.083 nm which indexing to the (2θ) of 31.82; this results revealed the Ni2O3 was a phase of nickel oxide with Nano structure. The synthesized Ni2O3 will be useful in manufacturng electrodes materials f
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show More