Extension of bandwidth for high reflectance zone for the spectral region (8-14pm) was studied adapting the concept of contiguous and overlapping high reflectance stacks. Computations was carried out using the modified characteristic matrix theory restricted to near-normal incidence of light on dielectric , homogenous and isotropic symmetrical stack. Certain precautions must be taken in the choice of stacks to avoid deep —reflectance minima from developing within the extended high reflectance region. Results illustrate that the techniques of extending the high reflectance regions are applicable not only to mirrors , but also to short-and long-edge filter and to narrow band pass filters.
A new series of metal ions complexes of VO(II), Cr(III), Mn(II), Zn(II), Cd(II) and Ce(III) have been synthesized from the Schiff bases (4-chlorobenzylidene)-urea amine (L1) and (4-bromobenzylidene)-urea amine (L2). Structural features were obtained from their elemental microanalyses, magnetic susceptibility, molar conductance, FT-IR, UV–Vis, LC-Mass and 1HNMR spectral studies. The UV–Vis, magnetic susceptibility and molar conductance data of the complexes suggest a tetrahedral geometry around the central metal ion except, VOII complexes that has square pyramidal geometry, but CrIII and CeIII octahedral geometry. The biological activity for the ligand (L1) and its Vanadium and Cadmium complexes were studied. Structural geometries of com
... Show MoreIn this paper we proposes the philosophy of the Darwinian selection as synthesis method called Genetic algorithm ( GA ), and include new merit function with simple form then its uses in other works for designing one of the kinds of multilayer optical filters called high reflection mirror. Here we intend to investigate solutions for many practical problems. This work appears designed high reflection mirror that have good performance with reduction the number of layers, which can enable one to controlling the errors effect of the thickness layers on the final product, where in this work we can yield such a solution in a very shorter time by controlling the length of the chromosome and optimal genetic operators . Res
... Show More
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show MoreA perturbed linear system with property of strong observability ensures that there is a sliding mode observer to estimate the unknown form inputs together with states estimation. In the case of the electro-hydraulic system with piston position measured output, the above property is not met. In this paper, the output and its derivatives estimation were used to build a dynamic structure that satisfy the condition of strongly observable. A high order sliding mode observer (HOSMO) was used to estimate both the resulting unknown perturbation term and the output derivatives. Thereafter with one signal from the whole system (piton position), the piston position make tracking to desire one with a simple linear output feedback controller after ca
... Show MoreThis paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show MoreUnder cyclic loading, aluminum alloys exhibit less fatigue life than steel alloys of similar strength and this is considered as Achilles's heel of such alloys. A nanosecond fiber laser was used to apply high speed laser shock peening process on thin aluminum plates in order to enhance the fatigue life by introducing compressive residual stresses. The effect of three working parameters namely the pulse repetition rate (PRR), spot size (ω) and scanning speed (v) on limiting the fatigue failure was investigated. The optimum results, represented by the longer fatigue life, were at PRR of 22.5 kHz, ω of 0.04 mm and at both v's of 200 and 500 mm/sec. The research yielded significant results represented by a maximum percentage increase in the fa
... Show MoreAbstract
The current research aims to identify the analysis of the questions for the book of literary criticism for the preparatory stage according to Bloom's classification. The research community consists of (34) exercises and (45) questions. The researcher used the method of analyzing questions and prepared a preliminary list that includes criteria that are supposed to measure exercises, which were selected based on Bloom's classification and the extant literature related to the topic. The scales were exposed to a jury of experts and specialists in curricula and methods of teaching the Arabic language. The scales obtained a complete agreement. Thus, it was adapted to become a reliable instrument in this
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreMany changes took place in a number of Arab countries, most of which ended with the change of the ruling leadership and a new coming. The same change brought about the hopes of the people to turn the page of the past into a democracy through which to overcome the grievances of previous years and achieve justice in all its aspects. The same new grievances have been added to that precedent and justice has not yet been achieved. Here we try to address the justice that is applied in the stages of change or transitional stages, which have been called, ie transitional justice, which has mechanisms and conditions of different application between countries, each of which the conditions applied in them and through a review of these mechanisms bet
... Show MoreAl-Ruhbah region is located in the southwest of Najaf Governorate. A numerical model was created to simulate groundwater flow and analyze the water quality of the groundwater, by developing a conceptual model within the groundwater modeling system software. Nineteen wells were used, 15 for pumping and four for observation. A three-dimensional model was built based on the cross-sections indicating the geologic layers of the study area, which were composed of five layers. When a distance of 1,000 m between the wells was adopted, 135 wells can be operated simultaneously. These wells were hypothetically operated at 6, 12, and 18 h intervals, with a discharge of 200, 430, and 650 m