Preferred Language
Articles
/
ijp-991
Theoretical Investigations of Electronic and Optical Properties of Vanadium Doped Wurtzite Zinc Oxide from First Principle Calculation Method
...Show More Authors

In this study lattice parameters, band structure, and optical characteristics of pure and V-doped ZnO are examined by employing (USP) and (GGA) with the assistance of First-principles calculation (FPC) derived from (DFT). The measurements are performed in the supercell geometry that were optimized. GGA+U, the geometrical structures of all models, are utilized to compute the amount of energy after optimizing all parameters in the models. The volume of the doped system grows as the content of the dopant V is increased. Pure and V-doped ZnO are investigated for band structure and energy bandgaps using the Monkhorst–Pack scheme's k-point sampling techniques in the Brillouin zone (G-A-H-K-G-M-L-H). In the presence of high V content, the bandgap energy decreases from 3.331 to 2.043 eV as seen by the band diagram. PDOS diagram was utilized to get the insight of the electronic structure of the atoms and the amount to which all energy bands contribute to a particular orbit of the atoms. As the V content grew, so did the PDOS for all of the states. The manipulation of bandgaps was carried out in a way that narrowing the bandgaps occurs, resulting in a redshift of the absorption spectrum in the IR region. At lower photon energies, the imaginary and real parts dielectric functions have increased. The effectiveness of V atoms on transmissivity especially in the low energy region of the V-doped ZnO perovskite has been verified compared to the other theoretical results.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
Computer Simulation for the Effects of Optical Aberrations on Solar Images Using Karhunen-Loeve polynomials
...Show More Authors

     Numerical simulations were carried out to evaluate the effects of different aberrations modes on the performance of optical system, when observing and imaging the solar surface. Karhunen-Loeve aberrations modes were simulated as a wave front error in the aperture function of the optical system. To identify and apply the appropriate rectification that removes or reduces various types of aberration, their attribute must be firstly determined and quantitatively described. Wave aberration function is well suitable for this purpose because it fully characterizes the progressive effect of the optical system on the wave front passing through the aperture. The Karhunen-Loeve polynomials for circular aperture were used to

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
Study of Some Structural Properties of Porous Silicon Preparing by Photochemical Etching
...Show More Authors

Abstract:Porous Silicon (PSi) has been produced in this work by using Photochemical (PC) etching process by using a hydrofluoric acid (HF) solution. The irradiation has been achieved using quartz- tungsten halogen lamp. The influence of various irradiation times on the properties of PSi اmaterial such as layer thickness, etching rate and porosity was investigated in this work too. The XRD has been studied to determine the crystal structure and the crystalline size of PSi material

Preview PDF
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Study of Some Structural Properties of Porous Silicon Preparing by Photochemical Etching
...Show More Authors

Porous Silicon (PSi) has been produced in this work by using Photochemical (PC) etching process by using a hydrofluoric acid (HF) solution. The irradiation has been achieved using quartz- tungsten halogen lamp. The influence of various irradiation times on the properties of PSi اmaterial such as layer thickness, etching rate and porosity was investigated in this work too.
The XRD has been studied to determine the crystal structure and the crystalline size of PSi material

View Publication Preview PDF
Publication Date
Mon Dec 31 2012
Journal Name
College Of Islamic Sciences
The hadiths that al-Mazy cited in his book "Tuhfat al-Ashraf" from the Imam Ahmad Imam's collection and study
...Show More Authors

This research seeks to attempt to reveal the intention of Al-Hafiz Al-Mazi from his market to hadiths from Imam Ahmad’s Musnad in his book “Masterpiece of Supervision in Knowing the Parties”, and researchers know that this book was classified by Al-Mazi to collect the parties to the six books: Sahih Al-Bukhari, Sahih Muslim, Sunan Abi Dawud, Jamea Al-Tirmidhi and Sunan Al-Nasa’i and Sunan Ibn Majah, in addition to some of the books ’authors’ books, and arranging them according to the Musnad, and it is not Musnad Ahmad from his condition, even if it is close to the arrangement of Mazi’s work, as he was a follower of that to the original owner Abu al-Qasim bin Asaker in his book “Supervising Knowledge of the Parties” in M

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 27 2022
Journal Name
Al–bahith Al–a'alami
POLITICAL DEBATES AND THEIR ARTISTIC CONSTRUCTION IN IRAQI SATELLITE CHANNELS ( AN ANALYTICAL STUDY ) : (A research drawn from a Master Thesis)
...Show More Authors

The problem of research on the study of political debate programs in the Iraqi satellite channels, in the "People decide" program by Afaq channel and " electoral competition " by Fallujah channel), and its importance for the community and researchers in the scientific field, as new programs to enter the Iraqi media after we have been the world media a lot in this area at the academic and practical levels (The field), and seeks to find out what the technical construction of the programs of political debates in Iraqi satellite channels and methods of construction and methods of employment used by the technical elements in the presentation of the programs and The study adopted the surve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Improve The Fully Convolutional Network Accuracy by Levelset and The Deep Prior Method
...Show More Authors

     Deep learning techniques allow us to achieve image segmentation with excellent accuracy and speed. However, challenges in several image classification areas, including medical imaging and materials science, are usually complicated as these complex models may have difficulty learning significant image features that would allow extension to newer datasets. In this study, an enhancing technique for object detection is proposed based on deep conventional neural networks by combining levelset and standard shape mask. First, a standard shape mask is created through the "probability" shape using the global transformation technique, then the image, the mask, and the probability map are used as the levelset input to apply the image segme

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jul 01 2013
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
ON THE OCCURRENCE OF THE[ MONOGENEAN GYRODACTYLUS TAIMENI ERGENS, 1971 FOR THE FIRST TIME IN IRAQ ON GILLS OF THE COMMON CARP CYPRINUS CARPIO
...Show More Authors

The monogenean Gyrodactylus taimeni Ergens, 1971 was recorded in this study for the first time in Iraq from gills of the common carp Cyprinus carpio Linnaeus, 1758. The description and measurements of this parasite as well as illustration were given. In addition, a list of species of Gyrodactylus so far recorded from C. carpio in Iraq is also included together with a list of all other hosts recorded for each gyrodactylid species.

View Publication Preview PDF