We report here the observation of 16 µm superradiance laser action generated from optical pumping of CF4 gas molecules (which is cooled to 140 Kº by a boil-off liquid-N2) by a TEA-CO2 laser 9R12 line. Output laser pulses of 7 mJ and 200 ns have been obtained.
In this work ,pure and doped(CdO)thin films with different concentration of V2O5x (0.0, 0.05, 0.1 ) wt.% have been prepared on glass substrate at room temperature using Pulse Laser Deposition technique(PLD).The focused Nd:YAG laser beam at 800 mJ with a frequency second radiation at 1064 nm (pulse width 9 ns) repetition frequency (6 Hz), for 500 laser pulses incident on the target surface At first ,The pellets of (CdO)1-x(V2O5)x at different V2O5 contents were sintered to a temperature of 773K for one hours.Then films of (CdO)1-x(V2O5)x have been prepared.The structure of the thin films was examined by using (XRD) analysis..Hall effect has been measured in orded to know the type of conductivity, Finally the solar cell and the effici
... Show MoreThe bubble columns are widely used as a two or three phase reactor in industrial chemical process such as absorption, biochemical reactions, coal liquefaction, etc. To design such a column, two main parameters should be taken in consideration, the gas hold-up (), and the liquid phase mass transfer coefficient KLa. The study includes the effect of gas velocity and the addition of alcohols on gas hold-up and mass transfer coefficient in bubble column with draught tube when the length of the column is 1.5m and the ratio of the draught tube diameter to the column diameter equals 0.5 and the air dispersion into the base of the draught tube using a multi hole tuyere is equivalent to a diameter of 0.15 mm and
... Show MoreCervical ectropion is considered to be a physiologic condition caused by columnar epithelium migration from the cervical canal into the vaginal portion of the cervix and usually there is no treatement for clinically asymptomatic cervical ectropion . Treatment can be achieved by thermal cauterization (Electrocautery), Cryosurgery or laser vaporization. Aim of the study: To study the effectiveness of CO2 laser (10600nm) in treatment of symptomatic cervical ectropion . Setting: The study was carried out at Laser Medicine Research Clinic at the Institute of Laser for Postgraduate Studies, University of Baghdad between the first of August 2013 to the end of October 2013. Patients and Methods: Ten female Patients with age range between 25-48 y
... Show MoreSeveral types of laser are used in experimental works in order to study the effects of laser on blood vessel. They differ from each other by a lot of properties mainly in wavelength, energy of the laser and pulse duration. In this study argon laser (488 nm- 514 nm) and continuous Nd: YAG laSer (1064 nm), have been applied to 50 samples of sheep blgod tesselS. Histologically, tha results of the study were different According to the txpe of L`sar used; apgon larer had distrabtave effects on $he blood vessal while continuous Nd: YAG laser Appeaped to be the safesd one on the blmod vessel architecture. This study concluded that argoj laser has da-aging ef&ect on
... Show MoreLaser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable
An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show More