In this work laser detection and tracking system (LDTS) is designed and implemented using a fuzzy logic controller (FLC). A 5 mW He-Ne laser system and an array of nine PN photodiodes are used in the detection system. The FLC is simulated using MATLAB package and the result is stored in a lock up table to use it in the real time operation of the system. The results give a good system response in the target detection and tracking in the real time operation.
The presented work shows a preliminary analytic method for estimation of load and pressure distributions on low speed wings with flow separation and wake rollup phenomena’s. A higher order vortex panel method is coupled with the numerical lifting line theory by means of iterative procedure including models of separation and wake rollup. The computer programs are written in FORTRAN which are stable and efficient.
The capability of the present method is investigated through a number of test cases with different types of wing sections (NACA 0012 and GA(W)-1) for different aspect ratios and angles of attack, the results include the lift and drag curves, lift and pressure distributions along the wing s
... Show MoreIn this paper Zener diode was manufactured using ZnO-CuO-ZnO/Si heterojunction structure that used laser induced plasma technique to prepare the nanofilms. Six samples were prepared with a different number of laser pulses, started with 200 to 600 pulses on ZnO tablet with fixed the number of laser pulses on CuO tablet at 300 pulses. The pulse energy of laser deposited was 900mJ using ZnO tablet and 600mJ using CuO tablet. All prepared films shown good behavior as Zener diode when using porous silicon as substrate.
This paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time
... Show More
Abstract
This current research aims to make theoretical frame for the thoughts and principle knowledge for high performance work system ،also trying to know the role that high performance work system practices which is (Effective staffing، comprehensive training، providing work career، and employee participation) play to enhance the organization effectiveness ، although knowing the principles of high performance work system which is: (Shared Information، Knowledge Development Performance and Reward linkage Egalitarianism)and its effect on the organizations. As well as defining the special concept of High performance wo
... Show MoreTurkman literature is regarded as a branch of the general Turkish literarure. The title Turman literature began to be used after 1918, and this remained under the influence of classical Turkishliterature till the beginning of the twentieth century. The best poets who repreesented this type are Hijri Dada, Khidir Lütfi, Mohammad Sadiq, Othman Mathloom and others…
In this study I followed the method of Professor Doctor Mohammad Kaplan (Ph.D) and Professor Doctor Nurullah Çetin(Ph.D) in analysing the poetical design. In this study I tried to analyse the poem entitled Taliim (My Fate) by the poet Khidir Lütfi and the poet Othman mathloom who wrote a poem wi
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreInsurance companies seeking to develop programs to promote and market their services and to increase its customer through the use of modern technical marketing and reduce its dependence on agents and take advantage of work of the banks by alliances with them and including reinforcing get the parties to competitive advantages in the financial market , the insurance services intangible service stops marketed over the insurance awareness and requires exceptional promotional efforts. &nbs
... Show MoreIn this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-
... Show MoreAbstract
Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each
... Show More