In this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
Tendon is important structure of the human body, since it can sustain tensile loading. The primary function of this tissue is to stabilize the joints they attached to it during daily activities. As well as, tendon has viscoelastic properties that can determine their response to loading and restrict the potential of injuries. One of the major points that this paper works with is the study of the biomechanical behaviour of tendon in response to tensile loading to describe their biological behaviour. Also, conclude the mathematical expression that may illustrate the tendon behaviour. All of the experiments were made in Physiology laboratories / Medical College/ Al- Nahrain University on ten rats "Rattus Norvegicus" of [108- 360] gm weight f
... Show MoreThe relation between the output power and wavelengths for a 532nm 3W frequency doubled diode pumped solid state laser pumped Ti:Sapphire crystal is investigated. A 20 femtosecond pulse at 800 nm is obtained. A 320 mW is found to be the highest power at 800nm. Below this wavelength value and above the power was found to deviate from highest output value.
In recent years, Wireless Sensor Networks (WSNs) are attracting more attention in many fields as they are extensively used in a wide range of applications, such as environment monitoring, the Internet of Things, industrial operation control, electric distribution, and the oil industry. One of the major concerns in these networks is the limited energy sources. Clustering and routing algorithms represent one of the critical issues that directly contribute to power consumption in WSNs. Therefore, optimization techniques and routing protocols for such networks have to be studied and developed. This paper focuses on the most recent studies and algorithms that handle energy-efficiency clustering and routing in WSNs. In addition, the prime
... Show MoreReducing the drag force has become one of the most important concerns in the automotive industry. This study concentrated on reducing drag through use of some external modifications of passive flow control, such as vortex generators, rear under body diffuser slices and a rear wing spoiler. The study was performed at inlet velocity (V=10,20,30,40 m/s) which correspond to an incompressible car model length Reynolds numbers (Re=2.62×105, 5.23×105, 7.85×105 and 10.46×105), respectively and we studied their effect on the drag force. We also present a theoretical study finite volume method (FVM) of solvi
Many oil and gas processes, including oil recovery, oil transportation, and petroleum processing, are negatively impacted by the precipitation and deposition of asphaltene. Screening methods for determining the stability of asphaltenes in crude oil have been developed due to the high cost of remediating asphaltene deposition in crude oil production and processing. The colloidal instability index, the Asphaltene-resin ratio, the De Boer plot, and the modified colloidal instability index were used to predict the stability of asphaltene in crude oil in this study. The screening approaches were investigated in detail, as done for the experimental results obtained from them. The factors regulating the asphaltene precipitation are different fr
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreDepp and Heard's trial has reaped significant attention due to the domestic violence allegations directed towards each other. This paper sheds light on the repressed narrative beyond the mere words spoken aloud. It delves into an overlooked aspect, i.e., nonverbal communication. Previous studies focused on one or two categories of nonverbal communication. Therefore, the current study investigates the types and sub-types of nonverbal communication exhibited by both rivals within the courtroom setting. To examine the credibility and repressibility of nonverbal communication, the researchers have carefully watched (28) videos representing the whole trial's event. Some nonverbal communication was traced through the whole (28) videos fro
... Show MoreSurveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion