Two- dimensional numerical simulations are carried out to study the elements of observing a Dirac point source and a Dirac binary system. The essential features of this simulation are demonstrated in terms of the point spread function and the modulation transfer function. Two mathematical equations have been extracted to present, firstly the relationship between the radius of optical telescope and the distance between the central frequency and cut-off frequency of the optical telescope, secondly the relationship between the radius of the optical telescope and the average frequency components of the modulation transfer function.
This work presents a novel technique for the detection of oil aging in electrical transformers using a single mode optical fiber sensor based on surface plasmon resonance (SPR). The aging of insulating oil is a critical issue in the maintenance and performance of electrical transformers, as it can lead to reduce insulation properties, increase risk of electrical breakdown, and decrease operational lifespan. Many parameters are calculated in this study in order to examine the efficiency of this sensor like sensitivity (S), signal to noise ratio (SNR), resolution (refractive index unit) and figure of merit (FOM) and the values are for figure of merit is 11.05, the signal to noise ratio is 20.3, the sensitivity is 6.63, and the resolution is 3
... Show MoreIn this research study the effect of fish on the properties optical films thickness 1200-1800 and calculated energy gap Basra direct transport permitted and forbidden to membranes and urged decreasing values ??of Optical Energy Gap increase fish included accounts optical also calculate the constants visual as factories winding down and the refractive index and reflectivity membranes also by real part and imaginarythe dielectric constant
Tin oxide films (SnO2) of thickness (1 ?m) are prepared on glass substrate by post oxidation of metal films technique. Films were irradiated with Nd:YAG double frequency laser of wavelength (532 nm) pulses of three energies (100, 500, 1000) mJ. The optical absorption, transmission, reflectance, refractive index and optical conductivity of these films are investigated in the UV-Vis region (200-900) nm. It was found that the average transmittance of the films is around (80%) at wavelength (550 nm) and showed high transmission (? 90 %) in the visible and near infrared region. The absorption edge shifts towards higher energies, which is due to the Moss-Burstien effect and it lies at (4 eV). The optical band gap increased with increasing of ene
... Show MoreThe study aimed to know the effect of the use alcoholic ethanol extraction of Boswellia Carterii In prolonging the period of preservation cooled ground meat in 4C for 6 days, it has been mixing ground meat with 150,300,450 mg/ml of alcoholic extract Consecutive, Where (0 was the control sample), All samples were stored separately for 0 , 3 , 6 days in Refrigerator temperature 4 C, Conducted by some microbial tests, Results have shown that mixing the ground meat with Boswellia Carterii extraction Led to prolong the storage of meat for 6 days at 4 C .and the Best result came when adding alcoholic ethanol extract of Boswellia Carterii by 450mg/ml Which Equal 0.9 g ,that reducing microbial load more higher than 150&300 mg/ml. All of thes
... Show MoreThe synthesis, characterization and mesomorphic properties of two new series of triazine-core based liquid crystals have been investigated. The amino triazine derivatives were characterized by elemental analysis, Fourier transforms infrared (FTIR), 1HNMR and mass spectroscopy. The liquid crystalline properties of these compounds were examined by differential scanning calorimetry (DSC) and polarizing optical microscopy (POM). DSC and POM confirmed nematic (N) and columnar mesophase textures of the materials. The formation of mesomorphic properties was found to be dependent on the number of methylene unit in alkoxy side chains.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More