Preferred Language
Articles
/
tIZjVIYBIXToZYAL4oL0
Cu (In, Ga) Se2 an absorber layer of photovoltaic devices
...Show More Authors

CIGS nanoink has synthesized from molecular precursors of CuCl, InCl3, GaCl3 and Se metal heat up 240 °C for a half hour in N2-atmosphere to form CIGS nanoink, and then deposited onto substrates of soda-lime glass (SLG). This work focused on CIGS nanocrystals, indicates their synthesis and applications in photovoltaic devices (PVs) as an active light absorber layers. in this work, using spin-coating to deposit CIGS layers (75 mg/ml and 500 nm thickness), without selenization at high temperatures, were obtained up to 1.398 % power conversion efficiency (PCE) at AM 1.5 solar illumination. Structural formations of CIGS chalcopyrite structure were studied by using x ray diffraction XRD. The morphology and composition of CIGS were studied using scanning electron microscopy SEM.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
An Improved Adaptive Spiral Dynamic Algorithm for Global Optimization
...Show More Authors

This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Egyptian Journal Of Aquatic Biology And Fisheries
Carbon Sources and Riverine Algal Biomass: An Experimental Study
...Show More Authors

A lotic ecosystem is considered a source of carbon dioxide (CO2) in the atmosphere where it becomes supersaturated with CO2, which contributes to the global carbon cycle. To enhance our comprehension of the roles of CO2 in rivers, an outdoor experiment was designed with controlled carbon source inputs to investigate the roles of the dissolved organic carbon (DOC) and dissolved inorganic carbon (DIC) in the phytoplankton community. Plastic enclosures were installed in the Tigris River within Baghdad for that goal. Samples were collected on the first day, as well as on the 5th and the 12th days from 14 enclosures. The enclosures were treated by artificial glucose (C6H12O6) (10, 20, 30mg/ l) as DOC sources, while sodium bicarbonate (NaHCO3) (1

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 08 2024
Journal Name
Journal Of Ecohumanism
Academic Problems Among Iraqi University Professors: An Analytical Study
...Show More Authors

The research aims to detect the problems of educational reality faced by university professors and identify statistically significant differences in the academic problems of university instructors. It has adopted an analytical descriptive research approach to achieve research objectives and identifies the study community with professors of public and private universities. A random sample of 250 instructors was selected for the purpose of applying the questionnaire to them, knowing the academic problems encountered in the course of their work at universities, and adopting appropriate statistical means to process and analyze the data. The research concluded with a set of results, including that all fields (infrastructure, admission of

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 25 2021
Journal Name
International Journal Of Drug Delivery Technology
Synthesis, Structural Study, and Biological Activity Evaluation of VO(II), Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II), and Hg(II) Complexes with New Schiff Base Ligand Derived from Pyrazine
...Show More Authors

New Schiff base [3-(3-acetylthioureido)pyrazine-2-carboxylic acid][L] has been prepared through 2 stages, the chloro acetyl chloride has been reacting with the ammonium thiocyanate in the initial phase for producing precursor [A], after that [A] has been reacting with the 3-amino pyrazine-2-carboxilic acid to provide a novel bidentate ligand [L], such ligand [L] has been reacting with certain metal ions in the Mn(II), VO(II), Ni(II), Co(II), Zn(II), Cu(II), Hg(II), and Cd(II) for providing series of new metal complexes regarding general molecular formula [M(L)2XY], in which; VO(II); X=SO4,Y=0, Co(II), Mn(II), Cu(II), Ni(II), Cd(II), Zn(II), and Hg(II); Y=Cl, X=Cl. Also, all the compounds were characterized through spectroscopic techniques [

... Show More
Publication Date
Sat Dec 26 2020
Journal Name
International Journal Of Pharmaceutical Research
Complexes of Co(II), Cu(II), Ni(II), Pt(II) And Pd(II) with N 3 O-Chelating Ligand Incorporating Azo and Schiff Base Moieties: Synthesis, Spectroscopic, Thermal Decomposition, Theoretical Studies, and thermodynamic parameters
...Show More Authors

Publication Date
Mon Feb 04 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using Regression Analysis as Analytical Procedure to Facilitate the Decision-Making Process in The Tax Audit: An Applied Research in the General Commission of Taxes
...Show More Authors

This research aims to clarify the advantages of using the regression method as analytical procedure in the tax audit to reducing the examination cost , time, effort, human and material resources, and represents an applied study in the General Commission of taxes. In order to achieve its objectives the research has used in the theoretical side the descriptive approach (analytical), and in the practical side regression method has been applied to the research sample represented by the soft drinks company that is subject to the tax settlement for the year 2014, where the value of sales has been verified by using the regression method without conductinga comprehensive examination. The most important results of the research indicate that the r

... Show More
View Publication Preview PDF
Crossref