In this work, we are Study the effect of annealing temperature on the structure of a-Ge films doped with Sb and the electrical properties of a-Ge:Sb/c-Si heterojunction fabricated by deposition of a-Ge:Sb film on c-Si by using thermal evaporation. Electrical properties of aGe:Sb/c-Si heterojunction include I-V characteristics in dark at different annealing temperatures and C-V characteristics and with the C-V characteristics suggest that the fabricated heterojunction was abrupt type, built in potential determined by extrapolation from 1/C2-V curve and show that the built - inpotential (Vbi) for the Ge:Sb/Si system increases with the increase of annealing temperatures
An experimental work has been conducted on wall attachment fluidics amplifiers, one of them to study the effect of output pressure or load on the amplifier performance. The output load has been simulated as a piston connected to the device output and the piston can be loaded accordingly. The results shows that the output volume flow rate increases as the supply pressure increases under different load and the output pressure remains constant as the supply pressure increases under constant load.
Assessment of the in service behavior of asphalt stabilized subgrade soil under environmental impact has got little attention by the research workers. However, the sustainability of the roadway depends mainly on the welfare of its subgrade soil condition. In this work, Gypseous soil was stabilized with asphalt emulsion for subgrade usage, the durability of the mixture has been assessed in term of its ability to maintain the compressive strength when practicing the environmental impacts. Specimens of 38 mm in diameter , and 76 mm in height have been prepared with various water-asphalt percentages, and subjected to 30 cycles of (freezing-thawing), (heating-cooling) and (wetting-drying) processes. Specimens have been tested for unconfined comp
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreRacism is a serious issue that impacts a lot of people around the world. Since slavery days, racial discrimination has been increasing to abhorrent levels in relation to black people. The aim of individual psychology by Alfred Adler is to study human behaviour by situating it in the social context which makes his writing ideal to explanation of racism. This paper aims to study racism in Roy Williams’ Fallout from the perspective of Alfred Adler’s theory. Alfred Adler's individual psychology emphasizes the importance of social factors in shaping individual behavior, including the ways in which individuals form their sense of self and identity. This makes it a valuable framework for understanding the complex social and psychological facto
... Show MoreIn this paper, we introduce and study the concept of a new class of generalized closed set which is called generalized b*-closed set in topological spaces ( briefly .g b*-closed) we study also. some of its basic properties and investigate the relations between the associated topology.
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreIris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show More