In this work laser detection and tracking system (LDTS) is designed and implemented using a fuzzy logic controller (FLC). A 5 mW He-Ne laser system and an array of nine PN photodiodes are used in the detection system. The FLC is simulated using MATLAB package and the result is stored in a lock up table to use it in the real time operation of the system. The results give a good system response in the target detection and tracking in the real time operation.
Wireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica
... Show MoreBeryllium Zinc Oxide (BexZn1-xO) ternary nano thin films were deposited using the pulsed laser deposition (PLD) technique under a vacuum condition of 10-3 torr at room temperature on glass substrates with different films thicknesses, (300, 600 and 900 nm). UV-Vis spectra study found the optical band gap for Be0.2Zn0.8O to be (3.42, 3.51 and 3.65 eV) for the (300, 600 and 900nm) film thicknesses, respectively which is larger than the value of zinc oxide ZnO (3.36eV) and smaller than that of beryllium oxide BeO (10.6eV). While the X-ray diffraction (XRD) pattern analysis of ZnO, BeO and Be 0.2 Zn 0.8 O powder and nano-thin films indicated a hexa
... Show MoreIn this research, analytical study for simulating a Fabry-Perot bistable etalon (F-P cavity) filled with a dispersive optimized nonlinear optical material (Kerr type) such as semiconductors Indium Antimonide (InSb). An optimization procedure using reflective (~85%) InSb etalon (~50µm) thick is described. For this etalon with a (50 µm) spot diameter beam, the minimum switching power is (~0.078 mW) and switching time is (~150 ns), leading to a switching energy of (~11.77 pJ) for this device. Also, the main role played by the temperature to change the etalon characteristic from nonlinear to linear dynamics.
This study aimed to evaluate the surface changes of commercial pure Titanium disks (CP Ti) and the Ti 13Nb 13 Zr (Alloy) with a zigzag pattern of laser surface treatment. In vitro, experimental study of CNC Laser treatment on the CP Ti and Alloy disks. Texturing the surfaces of CP Ti and Alloy disks via CNC laser, the sample disks were analyzed using surface roughness, wettability and FESEM. The FESEM revealed a proper increase in the surface texturing and roughness on macro and micro measures without crack formation or dramatic change of the core substance of the CP Ti and Alloy disks. The CNC laser is an effective and suitable method for surface texturing CP Ti and Alloy for dental implantology. Keywords: Commercial pure Titanium;
... Show MoreThis paper reports the effect of Mg doping on structural and optical properties of ZnO prepared by pulse laser deposition (PLD). The films deposited on glass substrate using Nd:YAG laser (1064 nm) as the light source. The structure and optical properties were characterized by X-ray diffraction (XRD) and transmittance measurements. The films grown have a polycrystalline wurtzite structure and high transmission in the UV-Vis (300-900) nm. The optical energy gap of ZnO:Mg thin films could be controlled between (3.2eV and 3.9eV). The refractive index of ZnO:Mg thin films decreases with Mg doping. The extinction coefficient and the complex dielectric constant were also investigate.
A Field experiment was conducted in Horticulture and Landscape Department, College of Agricultural Engineering Sciences, University of Baghdad, Al-Jadriah during fall 2019-2020 to study changes in the growth and yield of broccoli grown in the alternative solution ABEER, affected by gas enrichment and spraying with coconut water and moringa aqueous extract under the hydroponic cultivation system. Nested design with three replications adopted in the experiment, each of them included in main plot the first factor, which is gas enrichment (O2 and O3), Then levels of second factor were randomly distributed within each replicate, which included spra
Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More