Preferred Language
Articles
/
pRaatIcBVTCNdQwC6lwW
Influence of Al dopant on structural and optical parameters of AgInSe2 thin film
...Show More Authors

Chalcopyrite thin films ternary Silver Indium Diselenide AgInSe2 (AIS) pure and Aluminum Al doped with ratio 0.03 was prepared using thermal evaporation with a vacuum of 7*10-6 torr on glass with (400) nm thickness for study the structural and optical properties. X-ray diffraction was used to show the inflance of Al ratio dopant on structural properties. X-ray diffraction show that thin films AIS pure, Al doped at RT and annealing at 573 K are polycrystalline with tetragonal structure with preferential orientation (112). raise the crystallinity degree. AFM used to study the effect of Al on surfaces roughness and Grain Size Optical properties such as the optical band gap, absorption coefficient, Extinction coefficient, refractive index, real and imaginary part of dielectric constant were calculated to inspect the influence of the Aluminum on the optical Parameters of AIS thin film. UV/Visible measure show the lowering in energy gap to 1.35 eV for AgInSe2: Al at 573 K this energy gap making these samples suitable for photovoltaic application.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte

... Show More
Scopus (73)
Crossref (53)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Results In Engineering
Thermodynamic modeling and performance analysis of photovoltaic-thermal collectors integrated with phase change materials: Comprehensive energy and exergy analysis
...Show More Authors

View Publication
Scopus (21)
Crossref (9)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Iraqi Journal Of Veterinary Sciences
Histological and histochemical observations of the prostate gland at resting and stimulating status in adult local Dog (Canis familiaris)
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (20)
Crossref (11)
Scopus Crossref
Publication Date
Mon May 01 2017
Journal Name
Spectrochimica Acta Part A: Molecular And Biomolecular Spectroscopy
Extraction, preparation and application of pigments from Cordyline fruticosa and Hylocereus polyrhizus as sensitizers for dye-sensitized solar cells
...Show More Authors

View Publication
Scopus (44)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2011
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
CAVE DWELLING ANIMALS IN IRAQ PART 2: SYSTEMATIC NOTES ON THE NUTHATCH OF THE FAMILY SITTIDAE (AVESPASSERIFORMES) IN IRAQ WITH ADDING SOME IMPORTANT KNOWLEDGE TO THE NEST BUILDING OF SITTATEPHRONOTA SHARPE, FROM BESAN VALE HAWRAMAN SLOPE, IRAQI KURDISTAN
...Show More Authors

This paper is a review of the genus Sitta in Iraq, Five species of this genus are recognized
Sitta kurdistanica, S. neumayr, S. europaea, S.dresseri and S. tephronota. Geographical
distribution and systematic nots were given for separation and identification, also some notes
on nest building and nest sites of S. tephronota supporting by figures are presented.

View Publication Preview PDF
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
The Correlation between the Dimensions of Organizational Silence and the F Function Life an Exploratory Study of the Views of a Sample of Workers in the Health Center / Sulaykh: The Correlation between the Dimensions of Organizational Silence and the F Function Life an Exploratory Study of the Views of a Sample of Workers in the Health Center / Sulaykh
...Show More Authors

The research aims to test the effect of the behavioral factors (intangible) represented by an explanatory variable represented by organizational silence and a responsive variable of quality of Function life. The problem was the negative effects of the organizational silence on the morale of the employees and consequently their performance and the quality of function life. To collect the data and information needed to measure the two variables of research conducted in the health center / Sulaikh by taking a sample of (40) employees to test the hypotheses of research through the survey of their views, using statistical tools non parametric using the program. The most important recommendations were the establishment of training workshops fo

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2016
Journal Name
Radiology Case Reports
Intralobar pulmonary sequestration in elderly woman: a rare case report with emphasis on imaging findings
...Show More Authors

View Publication
Scopus (8)
Crossref (10)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Evaluation Tv- Image Quality for Different Cable Signal Transmission Resistance Based on Contrast Edge Algorithm
...Show More Authors

Some degree of noise is always present in any electronic device that
transmits or receives a signal . For televisions, this signal i has been to s the
broadcast data transmitted over cable-or received at the antenna; for digital
cameras, the signal is the light which hits the camera sensor. At any case, noise
is unavoidable. In this paper, an electronic noise has been generate on
TV-satellite images by using variable resistors connected to the transmitting cable
. The contrast of edges has been determined. This method has been applied by
capturing images from TV-satellite images (Al-arabiya channel) channel with
different resistors. The results show that when increasing resistance always
produced higher noise f

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref