Preferred Language
Articles
/
ijs-1195
Impact of ZnO Atomic Ratio on Structural, Morphological and Some Optical Properties of (SnO2)1-x (ZnO)x Thin Films
...Show More Authors

In this work, SnO2 and (SnO2)1-x(ZnO)x composite thin films with different ZnO atomic ratios (x=0, 5, 10, 15 and 20%) were prepared by pulsed laser deposition technique on clean glass substrates at room temperature without any treatment. The deposited thin films were characterized by x-ray diffraction atomic force microscope  and UV-visible spectrophotometer to study the effect of the ZnO atomic ratio on their structural, morphological and optical properties. It was found that the crystallinety and the crystalline size vary according to ZnO atomic ratio. The surface appeared as longitudinal structures which was convert to spherical shapes with increasing ZnO atomic ratio. The optical transmission and energy gap increased with increasing ZnO atomic ratio. 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
On Čech fuzzy soft bi-clouser spaces
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economic And Administrative Science
On Shrinkage Estimation for Generalized Exponential Distribution
...Show More Authors

Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Agricultural And Statistical Sciences
ON ERROR DISTRIBUTION WITH SINGLE INDEX MODEL
...Show More Authors

In this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.

Scopus
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
On GCYD-Method In e-Abacus Diagram
...Show More Authors

     We will provide a new method in this study that integrates two types of applications, namely Graph Theory and Conjugate Young Diagram, the idea of combining the graph and the Young diagram is presented by Ali And Mahmood, which is primarily based on the idea of the e-abacus diagram, the new method is called GCYD, it directly applies to the English letter section, which will be a two-layer coding. It makes it difficult to detect the word or sentence.

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Projective 3-Space Over Galois Field
...Show More Authors

        The purpose of this paper is to give the definition of projective 3-space PG(3,q) over Galois field GF(q), q = pm for some prime number p and some integer m.

        Also, the definition of the plane in PG(3,q) is given and state the principle of duality.

        Moreover some theorems in PG(3,q) are proved.

View Publication Preview PDF
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor

... Show More