This paper presents the effect of relativistic and ponderomotive nonlinearity on cross-focusing of two intense laser beams in a collisionless and unmagnetized plasma. It should be noted here that while considering the self-focusing due to relativistic electron mass variation, the electron ponderomotive density depression in the channel may also be important. Therefore/these two nonlinearties may simultaneously affect the self-focusing process. These nonlinearities depend not only on the intensity of one laser but also on the second laser. Therefore, one laser beam affects the dynamics of the second beam and hence the process of cross-focusing takes place. The electric field amplitude of the excited electron plasma wave (EPW) has been calculated. Comparison of the theory with the recent experimental observations has also been presented.
Recently, there has been a notable surge in interest surrounding entrepreneurial orientation and strategic entrepreneurship. These concepts are particularly relevant due to their modern characteristics that aid in adapting to the environment. They also play a crucial role in improving production, service, and technological processes to sustain value, minimize competition, and drive ongoing enhancements, ultimately leading to a position of leadership within public companies. Therefore, the primary focus of this research was to examine the influence of entrepreneurial orientation on achieving strategic entrepreneurship. This influence is further mediated by the presence Iraqi Ministry of Agric
... Show Morewind load coefficient
Arthropod-borne infections, known as vector-borne diseases, are a significant threat to both humans and animals. These diseases are transmitted to humans and animals through the bites of infected arthropods. In the last half century, there have been a number of unexpected viral outbreaks in Middle Eastern countries. Recently, Iraq has witnessed an outbreak of the Crimean-Congo Hemorrhagic Fever virus with high morbidity and mortality rates in humans. However, very little is known about the prevalence and distribution of CCHFV in Iraq, and therefore, it is impossible to quantify the risk of infection. CCHFV is transmitted to humans through the bite of infected ticks. However, transmission can also occur through contact with the blood or ti
... Show MoreSocial media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are
... Show MoreThe impact of decorating Fe, Ru, Rh, and Ir metals upon the sensing capability of a gallium nitride nanotube (GaNNT) in detecting chlorine trifluoride (CT) was scrutinized using the density functionals B3LYP and B97D. The interaction of the pristine GaNNT with CT was a physical adsorption with the sensing response (SR) of approximately 6.9. After decorating the above-mentioned metals on the GaNNT, adsorption energy of CT changed from −5.8 to −18.6, −18.9, −19.4, and −20.1 kcal/mol by decorating the Fe, Ru, Rh, and Ir metals into the GaNNT surface, respectively. Also, the corresponding SR dramatically increased to 39.6, 52.3, 63.8, and 106.6. This shows that the sensitivity of the metal-decorated GaNNT (metal@GaNNT) increased by in
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More