Atmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geom
... Show More
Strengthening of the existing structures is an important task that civil engineers continuously face. Compression members, especially columns, being the most important members of any structure, are the most important members to strengthen if the need ever arise. The method of strengthening compression members by direct wrapping by Carbon Fiber Reinforced Polymer (CFRP) was adopted in this research. Since the concrete material is a heterogeneous and complex in behavior, thus, the behavior of the confined compression members subjected to uniaxial stress is investigated by finite element (FE) models created using Abaqus CAE 2017 software.
The aim of this research is to study experime
... Show Moreأن لعبة كرة السلة في تقدم وتطور مستمر حالها في ذلك حال الألعاب الرياضية الأخرى حيث أن الفضل في ذلك يعود إلى المعرفة بالعلوم المختلفة وكذلك البحث العلمي من اجل تحقيق نتائج متقدمة تنشدها معظم الدول ومنها العراق على الصعيد المحلي والعربي والدولي. ومما لاشك فيه أن متطلبات تطور مستوى نتائج القدرات البدنية في أيُة لعبة مرتبطة بالبرمجة والتخطيط الصحيح للمناهج التدريبية إذ تقودنا هذه الحقيقة إلى إجراء المزيد من الا
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
Purpose: The purpose of the study is to compare and evaluate Earnings Management in Tunisia and Iraq. Theoretical framework: Earnings Management is an important topic that has been studied by a significant number of researchers, as well as those who are interested in the accounting profession. Earnings Management has gotten a lot of attention from academics, professionals, and other interested parties in recent years (e.g. Kliestik et al., 2020; Rahman et al., 2021; Gamra &Ellouze, 2021) Design/methodology/approach: The sample includes ten banks listed on the Bourse of Tunisia and Iraq Stock Exchanges for the year 2017. We have used a model of Kothari et al., (2005) as a tool to measure Earnings Management in both mark
... Show MoreStrengthening of the existing structures is an important task that civil engineers continuously face. Compression members, especially columns, being the most important members of any structure, are the most important members to strengthen if the need ever arise. The method of strengthening compression members by direct wrapping by Carbon Fiber Reinforced Polymer (CFRP) was adopted in this research. Since the concrete material is a heterogeneous and complex in behavior, thus, the behavior of the confined compression members subjected to uniaxial stress is investigated by finite element (FE) models created using Abaqus CAE 2017 software. The aim of this research is to study experimentally and numerically, the beha
... Show MoreAd hoc networks are characterized by ease of setup, low costs, and frequent use in the corporate world. They ensure safety to the user and maintain the confidentiality of the information circulated. They also allow the user to address the cases of communication failure in areas subject to destruction of communication infrastructure. The proposed protocols in the ad hoc networks often build only one path to achieve communication between the nodes, due to the restrictions of battery run out and the movement of the nodes. This connection is often subject to a failure within a certain range. Thus, multiple alternate paths in ad hoc networks use a solution to failing node communications. In addition, when looking at the situation where interf
... Show MoreThe investment climate is the main engine of economic development. If an appropriate and attractive investment climate is created that takes into account economic, administrative, political and environmental issues, it will contribute to the development of industry, transfer of technology, diversification of agricultural production, increased productivity, the promotion of a green economy and support for sustainable and inclusive growth. Thus, analyzing the investment climate of a country can provide reasons and roots for the complexity of the problems in the economy. In the Iraqi economy, the problem has not been rooted in the economy, but the roots of the problem are deeper and inherent in the management of the economy. Investm
... Show MoreThis paper uses Artificial Intelligence (AI) based algorithm analysis to classify breast cancer Deoxyribonucleic (DNA). Main idea is to focus on application of machine and deep learning techniques. Furthermore, a genetic algorithm is used to diagnose gene expression to reduce the number of misclassified cancers. After patients' genetic data are entered, processing operations that require filling the missing values using different techniques are used. The best data for the classification process are chosen by combining each technique using the genetic algorithm and comparing them in terms of accuracy.
A specialized irradiation instrument "created instrument" was designed and created from various kinds and sizes of available plastic household-waste materials. In addition, a neutron beam collimator with a lid was designed and implemented. The collimator is with dimensions of 25 cm in height and 10 cm in inner diameter, while the lid dimensions are 11.5 cm height and outer diameter of 9.9 cm to perfectly match the inner diameter of the collimator with the possibility of movement (opening and closing), and also the shielding of the radioactive 241Am/Be neutron source with a recent activity of 37.5 mCi.
To investigate the efficiency of the "created instrument", ten hydrogenous material samples (ordinary p
... Show More