Laser drilling is capable of producing small, precisely positioned holes with high degree of reproductively. In this paper , IR millisecond Nd:YAG single pulsed laser was used to determine the effect of laser parameters on the drilled hole of the glass - fiber reinforced epoxy composite FR-4 sample of 2 mm in thickness . The type of laser source was GSI lumonics JK760TR Series laser 1.064μm system in a CNC cabin. The JK760TR series has a 0.3-50ms pulse length and a maximum repetition rate 500Hz with an average power of 600W. The investigation of single pulse laser drilling in this paper was based on theoretical and experimental solutions. In single pulse technique, the investigation included focal plane position fpp, pulse shape, laser peak power, and pulse duration. It was found that (-1) was the best fpp due to less taper for the drilled holes made by this level (Entrance hole =0.68, Exit hole = 0.27). To predict pulse shape effects; three types were : rectangular , rump-up and cool down, it were examined found that rectangular pulse was efficient more than the other types due to its ability to produce holes with less tapering as compared with others types. Also its found that all pulse shapes had the same effect on the materials microstructure . Laser peak power and pulse duration had the predominant affects on the hole dimensions and edge quality without any defect except hole tapering.
Developments are carried out to enhance the performance of vertical axis wind turbines (VAWT). This paper studies the performance of the ducted wind turbine with convergent duct (DAWT). Basically, the duct technique is utilized to provide the desired wind velocity facing the turbine. Methodology was developed to estimate the decisive performance parameter and to present the effect of the convergent duct with different inlet angles. The ducted wind turbine was analyzed and simulated using MATLAB software and numerically using ANSYS-Fluent 17.2. Result of both approaches were presented and showed good closeness for the two cases of covering angles 12 and 20 respectively. Results also showed that the convergent duct with an inlet angl
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreA numerical investigation has been performed to examine the effect of fluorine concentration on the chain reaction mechanisms and parameters of hydrogen fluoride (HF) chemical laser. The practical difficulties associated with this type of lasers impose that an alternative route might be quite useful. Thus, particular attention was paid to develop a computer program to investigate various processes. The results of this computer simulation program proved their credibility when compared with the little published data. This computer program is called Reaction Rate Simulation Model (RRSM). An entirely new approach to emulate the reaction mechanisms has been followed. The effectiveness of reaction rates in the processes of HF lase
... Show MoreNanoparticles generation by laser ablation of a solid target in a liquid environment is an easy method. Cadmium Telluride (CdTe) colloidal nanoparticles have been synthesized by laser ablation Nd:YAG with wavelengths of 1064nm and double frequency at 532 nm, number of pulses 50 pulses, with pulse energy= 620mJ, 700mJ of a solid target CdTe is immersed in double distilled deionized water (DDIW) and in methanol liquid. Influences of the laser energy and different solutions on the formation and optical characterization of the CdTe nanoparticles have been studied using atomic force microscope (AFM) and the UV-Vis absorption. As a results, it leads to the absorbance in UV-Vis spectra of samples prepared in water at laser wavelength of 532nm i
... Show MoreBackground: Sperm motility disorder is an important cause of infertility in male, and one of the causes of reduced motility of the sperm is the disorders of the mitochondria because it provides the required energy for sperm motility, Laser biostimulation or low-level laser therapy has a positive effect on the mitochondria and led to increasing the synthesis of ATP. Method: Twenty fresh human semen samples were used in this research study, each sample was separated into two portions, one was used as control which is not exposed to the laser beam and the other was irradiated with the wavelength of 410 nm diode laser with an output power of 100 mW and an exposure time of 60 seconds, then the measurement of
... Show MoreMetal contents in vegetables are interesting because of issues related to food safety and potential health risks. The availability of these metals in the human body may perform many biochemical functions and some of them linked with various diseases at high levels. The current study aimed to evaluate the concentration of various metals in common local consumed vegetables using ICP-MS. The concentrations of metals in vegetables of tarragon, Bay laurel, dill, Syrian mesquite, vine leaves, thymes, arugula, basil, common purslane and parsley of this study were found to be in the range of, 76-778 for Al, 10-333 for B, 4-119 for Ba, 2812-24645 for Ca, 0.1-0.32 for Co, 201-464 for Fe, 3661-46400 for K, 0.31–1.
... Show MoreTransactions on Engineering and Sciences
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More