In our work present, the application of strong-Lensing observations for some gravitational lenses have been adopted to study the geometry of the universe and to explain the physics and the size of the quasars. The first procedure was to study the geometrical of the Lensing system to determine the relation between the redshift of the gravitational observations with its distances. The second procedure was to compare between the angular diameter distances "DA" calculated from the Euclidean case with that from the Freedman models, then evaluating the diameter of the system lens. The results concluded that the phenomena are restricted to the ratio of distance between lens and source with the diameter of the lens noticing.
The weak and strong forms are so called because it is not their lexical content that primary matter, but the role they have in the sentence. The problematic confusion, our students encounter, in recognizing and producing the correct pronunciation of weak and strong forms of the English function words is the main incentive behind conducting this study. In order to gather the data, this paper used two types of tests: a recognition test and a production test. The general results reached through the analysis of the students' answers seem to conform to the researcher's assumption: students face a critical problem in recognizing and producing correct pronunciation of the weak and strong forms of the English funct
... Show MoreAbstract
This research aims to study and improve the passivating specifications of rubber resistant to vibration. In this paper, seven different rubber recipes were prepared based on mixtures of natural rubber(NR) as an essential part in addition to the synthetic rubber (IIR, BRcis, SBR, CR)with different rates. Mechanical tests such as tensile strength, hardness, friction, resistance to compression, fatigue and creep testing in addition to the rheological test were performed. Furthermore, scanning electron microscopy (SEM)test was used to examine the structure morphology of rubber. After studying and analyzing the results, we found that, recipe containing (BRcis) of 40% from th
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreIn this paper, an approach for object tracking that is inspired from human oculomotor system is proposed and verified experimentally. The developed approach divided into two phases, fast tracking or saccadic phase and smooth pursuit phase. In the first phase, the field of the view is segmented into four regions that are analogue to retinal periphery in the oculomotor system. When the object of interest is entering these regions, the developed vision system responds by changing the values of the pan and tilt angles to allow the object lies in the fovea area and then the second phase will activate. A fuzzy logic method is implemented in the saccadic phase as an intelligent decision maker to select the values of the pan and tilt angle based
... Show MoreWith the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se
... Show MoreDiode laser technology is well established for biomedicine applications which demand high-power pulse-wave. They are extensively utilized from medical imaging and testing to surgical therapies and the latest aesthetic processes. For medical therapeutic practices, diode lasers have become the ideal laser source for this particular purpose. In the last previous years, semiconductor laser technology has evolved to produce high-repetitions rate near-infrared pulsed lasers diodes that are dependable, low-cost, portable, and small-weight, about few grams. In this paper, we review the recent development and demonstration of diode laser devices for biomedical applications recorded in the latest years taking into account the power, wavelength, and p
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreDistribution of light intensity in the flat photobioreactor for microalgae cultivation as a step design for production of bio-renewable energy was addressed in the current study. Five sizes of bioreactors with specific distances from the main light source were adopted as independent variables in experiential design model. The results showed that the bioreactor’s location according to the light source, determines the nature of light intensity distribution in the reactor body. However, the cross-section area plays an important role in determining the suitable location of reactor to achieve required light homogeneity. This area could change even the expected response of the light passing through the reactor if Beer-Lambert's law is adopted.
... Show More