In this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
Design and construction of video extractor circuit require an understanding of several parameters, which include: Selector circuit, extracting circuit which contains sampling signal and multiplexing. At each radar pulse, the video signal is fed to one of the selector. The fast filter has a pass –band from 190 Hz to 1800 Hz. These frequencies correspond to targets having radial velocities laying between and 10 Kph and 200 Kph.Slow filter: 60 Hz to 230 Hz for radial velocities laying between 3.5 and 13 Kph.The video- extractor is organized in four PCB CG (A-B-C-D) each one having 16 selector. The sampling signal (ADS) (1-2-3-4) control the 4-line-to-16-line decoders. 8 multiplexers of 8 inputs each, are required for the multiplexing of the
... Show More<span>Deepfakes have become possible using artificial intelligence techniques, replacing one person’s face with another person’s face (primarily a public figure), making the latter do or say things he would not have done. Therefore, contributing to a solution for video credibility has become a critical goal that we will address in this paper. Our work exploits the visible artifacts (blur inconsistencies) which are generated by the manipulation process. We analyze focus quality and its ability to detect these artifacts. Focus measure operators in this paper include image Laplacian and image gradient groups, which are very fast to compute and do not need a large dataset for training. The results showed that i) the Laplacian
... Show MoreTwo quantitative, environment-friendly and easily monitored assays for Ni (II) and Co (III) ions analysis in different lipstick samples collected from 500-Iraqi dinars stores located in Baghdad were introduced. The study was based on the reaction of nickel (II) ions with dimethylglyoxime (DMG) reagent and the reaction of cobalt (III) ions with 1-nitroso-2-naphthol (NN) reagent to produce colored products. The color change was measured by spectrophotometric method at 565 nm and 430 nm for Ni and Co, respectively, with linear calibration graphs in the concentration range 0.25-100 mg L-1 (Ni) and 0.5-100 mg L-1 (Co) and LOD and LOQ of 0.11 mg L-1 and 0.36 mg L-1 (Ni), and 0.15 mg L-1 an
... Show MoreConvection heat transfer in a horizontal channel provided with metal foam blocks of two numbers of pores per unit of length (10 and 40 PPI) and partially heated at a constant heat flux is experimentally investigated with air as the working fluid. A series of experiments have been carried out under steady state condition. The experimental investigations cover the Reynolds number range from 638 to 2168, heat fluxes varied from 453 to 4462 W/m2, and Darcy number 1.77x10-5, 3.95x10-6. The measured data were collected and analyzed. Results show that the wall temperatures at each heated section are affected by the imposed heat flux variation, Darcy number, and Reynolds number variation. The var
... Show MoreExperimental investigation for small horizontal portable wind turbine (SHPWT) of NACA-44, BP-44, and NACA-63, BP-63 profiles under laboratory conditions at different wind velocity range of (3.7-5.8 m/s) achieved in present work. Experimental data tabulated for 2, 3, 4, and 6- bladed rotor of both profiles within range of blade pitch angles . A mathematical model formulated and computer Code for MATLAB software developed. The least-squares regression is used to fit experimental data. As the majority of previous works have been presented for large scale wind turbines, the aims were to present the performance of (SHPWT) and also to make a comparisons between both profiles to conclude which is the best performance. The overall efficiency and el
... Show MorePultruded materials made of Fiber-Reinforced Polymer (FRP) come in a broad range of shapes, such as bars, I-sections, C-sections, etc. FRP materials are starting to compete with steel as structural materials owing to their great resistance, low self-weight, and cheap maintenance costs, especially in corrosive conditions. This study aims to evaluate the effectiveness of a novel concrete Composite Column (CC) using Encased I-Section (EIS) as a reinforcement in contrast to traditional steel bars by using Glass Fiber-Reinforced Polymer (GFRP) as I-section (CC-EIS) to evaluate the effectiveness of the hybrid columns which have been built by combining GFRP profiles with concrete columns. To achieve the aims of this study, nine circular co
... Show MoreThe main objective of this study is to examine the impact of moisture concrete of clayey soil on the concrete slabs placed directly over it. This experimental study presents the mechanical properties of the concrete slab when placed on different clayey soil moisture content ranging from 0% to the optimum moisture content of 35%. The tests were performed on soil concrete specimens of 25*30*50 mm exposed to sprayed water curing conditions for 28 days. Tests of compressive strength, ultrasonic pulse velocity, crack depth and crack width were investigated through this paper. An ejection relationship between compressive strength of concrete and water content in the soil was observed, with a 26% increase with water increasing from 0% to 35%. T
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreThis study aims to determine the prevalence of Entamoeba histolytica, Entamoeba dispar and
Entamoeba moshkovskii by three methods of diagnosis (microscopic examination, cultivation and PCR) that
were compared to obtain an accurate diagnosis of Entamoeba spp. during amoebiasis. Total (n=150) stool
samples related to patients were (n = 100) and healthy controls (n= 50). Clinically diagnosed stool samples
(n=100) were collected from patients attending the consultant clinics of different hospitals in Basrah during
the period from January 2018 to January 2019. The results showed that 60% of collected samples were
positive in a direct microscopic examination. All samples were cultivated on different media; the Bra