In this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
A mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreThis paper compares between the direct and indirect georeferencing techniques in Photogrammetry bases on a simulation model. A flight plan is designed which consists of three strips with nine overlapped images for each strip by a (Canon 500D) digital camera with a resolution of 15 Mega Pixels.
The triangulation computations are carried out by using (ERDAS LPS) software, and the direct measurements are taken directly on the simulated model to substitute using GPS/INS in real case. Two computational tests have been implemented to evaluate the positional accuracy for the whole model and the Root Mean Square Error (RMSE) relating to (30) check points show that th
... Show MoreBackground: This clinical trial aims to evaluate the color changes of direct resin composite veneer (DCV) restorations based on spectrophotometric analysis of 4 different types of resin composites between the baseline immediately after polishing and after one year of follow-up. Materials and methods: 28 patients were assessed for eligibility for participation, aged between 18 and 38 years old, who indicated for DCV restorations in anterior maxillary teeth were considered for participation in this study. In total, 25 patients who met the inclusion criteria were selected (6 males and 19 females, mean age: 20.9 at the time of restoration placement), and 3 patients were excluded. Partic
... Show MoreForeign direct investment (FDI) is one of the most practical types of foreign investment. FDI contributes to job creation, foreign exchange earnings and national income escalation, improving semi-skill and skilled labor. Based on our knowledge, this paper is the first study attempting to investigate the effect of political stability on the FDI in Turkey using an econometric approach. Achieving this objective, a co-integration analysis was conducted between the FDI and its determinants in the short-run and long-run including “macroeconomic indicators” and “Political Stability (PS)” in Turkey. Using annual data from 1974 to 2017 via Auto-Regressive Distributed Lag (ARDL) model. The results confirm the positive correlation betwe
... Show MoreB Saleem, H Alwan, L Khalid, Journal of Engineering, 2011 - Cited by 2
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreABSTRACT
Ticagrelor is an orally administered antiplatelet medicine, direct-acting P2Y12-receptor antagonist. Ticagrelor binds reversibly and noncompetitively to the P2Y12 receptor at a site distinct from that of the endogenous agonist adenosine diphosphate (ADP). Inhibition of platelet aggregation stimulated by ADP is a commonly used pharmacodynamic parameter for P2Y12-receptor antagonists.
Ticagrelor is a crystalline powder with an aqueous solubility of approximately 10?g/mL at room temperature.
... Show MoreThe aerial part of Iraqi Anabasis aphylla (Chenopodiaceae) had been investigated for its alkaloidal contents.The alkaloid anabasine [2-(3-pyridyl)-piperidine] [1] & aphyllidine were isolated from an ethanolic extract of the plant. Isolation of the alkaloid was done by column chromatography followed by preperative thin layer chromatography. Identification of the isolated alkaloid was done by different spectroscopic methods (UV,IR), refractive index & TLC using authentic sample & preparation of a salt.
In this research, the dynamics process of charge transfer from the sensitized D35CPDT dye to tin(iv) oxide( ) or titanium dioxide ( ) semiconductors are carried out by using a quantum model for charge transfer. Different chemical solvents Pyridine, 2-Methoxyethanol. Ethanol, Acetonitrile, and Methanol have been used with both systems as polar media surrounded the systems. The rate for charge transfer from photo-excitation D35CPDTdye and injection into the conduction band of or semiconductors vary from a to for system and from a to for the system, depending on the charge transfer parameters strength coupling, free energy, potential of donor and acceptor in the system. The charge transfer rate in D35CPDT / the system is
... Show More