Charge extraction layers play a crucial role in developing the performance of the inverted organic solar cells. Using a transparent metal oxide with appropriate work function to the photoactive layer can significantly decrease interface recombination and enhance charge transport mechanism. Therefore, electron selective films that consist of aluminium-doped titanium dioxide (TiO2:Al) with different concentrations of Al (0.4, 0.8, and 1.2)wt % were prepared using sol-gel technique. The inverted organic solar cells PCPDTBT: PCBM with Al doped TiO2 as electron extraction layer were fabricated. It is well known that Al doping concentration potentially affects the physical characteristics of the TiO2 by controlling the optical, morphological, and structural properties. The effect of Al incorporation on the optical and morphological properties of the prepared films were analysed using UV-Vis spectroscopy, atomic force microscopy (AFM), X-ray diffraction (XRD), and scanning electron microscopy (SEM). The current–voltage (J-V) curves of the PCPDTBT: PCBM organic solar cells show that the TiO2:Al layer with 0.8% Al wt%, has the highest power conversion efficiency which is 3.02%.
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MorePolymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room
... Show MoreThe study consists of video clips of all cars parked in the selected area. The studied camera height is1.5 m, and the video clips are 18video clips. Images are extracted from the video clip to be used for training data for the cascade method. Cascade classification is used to detect license plates after the training step. Viola-jones algorithm was applied to the output of the cascade data for camera height (1.5m). The accuracy was calculated for all data with different weather conditions and local time recoding in two ways. The first used the detection of the car plate based on the video clip, and the accuracy was 100%. The second is using the clipped images stored in the positive file, based on the training file (XML file), where the ac
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreChacha 20 is a stream cypher that is used as lightweight on many CPUs that do not have dedicated AES instructions. As stated by Google, that is the reason why they use it on many devices, such as mobile devices, for authentication in TLS protocol. This paper proposes an improvement of chaha20 stream cypher algorithm based on tent and Chebyshev functions (IChacha20). The main objectives of the proposed IChacha20 algorithm are increasing security layer, designing a robust structure of the IChacha20 to be enabled to resist various types of attacks, implementing the proposed algorithm for encryption of colour images, and transiting it in a secure manner. The test results proved that the MSE, PSNR, UQI and NCC metrics
... Show MoreThis study was conducted to determine the effect of vitamin A ( 10 mg/kg ) on avearage testis weight and sexual glands ( Prostate and Seminal Vesicle ) for albino male mice treated with Hexavalent chromium ( 1000 ppm ) .The current study 40 mice were divided into fife groups : 1st group treated with distilled water and considered an control group (C) / the 2nd group treated with sesame oil ( T1) / 3rd group was givin hexavalent chromium ( 1000 ppm ) (T2) / 4th group treated with vitamin A ( 10 mg / kg ) and exposed to hexavalent chromium ( 1000 ppm ) (T3) / 5th group treated with vitamin A ( 10 mg kg ) (T4) . The expermint lasted 35 day . the results showed a significant ( P ? 0.05 ) decrease in avearage testis weight and sexual glan
... Show MoreDensity Functional Theory (DFT) with B3LYP hybrid exchange-correlation functional and 3-21G basis set and semi-empirical methods (PM3) were used to calculate the energies (total energy, binding energy (Eb), molecular orbital energy (EHOMO-ELUMO), heat of formation (?Hf)) and vibrational spectra for some Tellurium (IV) compounds containing cycloctadienyl group which can use as ligands with some transition metals or essential metals of periodic table at optimized geometrical structures.
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreFR Almoswai, BN Rashid, PEOPLE: International Journal of Social Sciences, 2017 - Cited by 22
The aim of the study was to study the implications of the strategic direction on organizational performance. The research was carried out in the Iraqi Ministry of Defense / Inspector General's Office for the purpose of identifying the nature of the relationship and the impact between the two variables. A sample of 60 people managers, department managers and directorates was targeted.
The researcher tried to test hypotheses in the first chapter, which was devoted to the methodology of research and previous studies and found the following: (1) validity of the first hypothesis of the existence of a relationship of positive significance of the strategic direction in its sub-dimensions with organizational perf
... Show More