Laser cleaning of materials’ surfaces implies the removal of deposited pollutants without affecting the material. Nanosecond Nd:YAG pulsed laser, operating at 1064 nm and 532nm, was utilized. Different laser intensities and number of pulses were used on metallic and non-metallic surfaces under O2 and Ar environments to remove metal oxide and crust. Cleaning efficiency was studied by optical microscope. The results indicated the superiority of 1064 nm over the 532 nm wavelength without any detectable damage to materials’ surfaces. Marble cleaned in Oxygen gas environment was better than in Ar gas.
The current study included, studying the ability of eight genera of plants belong to Brassicaceae family, Brassica tournifortii, Cakile Arabica, Capsella bursa – pastoris,Carrichtera annua, Diplotaxis acris, Diplotaxis haru , Eruca sativa and Erucaria hispanica to accumulate ten heavy metals Cadmium, Chromium , Copper, Mercury, Manganese ,Nickel ,Lead ,and Zinc . Plant leaves samples were collected from Al-Tib area during spring of 2021.The data demonstrated that, the highest conc. of Cd was 2.7 mg/kg in Diplotaxis acris leaves and lower value was 0.3 mg/kg in Cakile Arabica leaves. For Co, the highest conc.was 1.3 mg/kg in Capsella bursa – pastoris leaves, whereas the lower value was 0.5 mg/kg in Cakile arabica leaves. As for Cr ele
... Show MoreOptical fiber chemical sensor based surface Plasmon resonance for sensing and measuring the refractive index and concentration for Acetic acid is designed and implemented during this work. Optical grade plastic optical fibers with a diameter of 1000μm were used with a diameter core of 980μm and a cladding of 20μm, where the sensor is fabricated by a small part (10mm) of optical fiber in the middle is embedded in a resin block and then the polishing process is done, after that it is deposited with about (40nm) thickness of gold metal and the Acetic acid is placed on the sensing probe.
Electromyogram (EMG)-based Pattern Recognition (PR) systems for upper-limb prosthesis control provide promising ways to enable an intuitive control of the prostheses with multiple degrees of freedom and fast reaction times. However, the lack of robustness of the PR systems may limit their usability. In this paper, a novel adaptive time windowing framework is proposed to enhance the performance of the PR systems by focusing on their windowing and classification steps. The proposed framework estimates the output probabilities of each class and outputs a movement only if a decision with a probability above a certain threshold is achieved. Otherwise (i.e., all probability values are below the threshold), the window size of the EMG signa
... Show MoreThis study is an attempt to investigate the conceptual metaphor of UP and DOWN commonly used in Iraqi community. Some of the metaphorical expressions in Iraqi colloquial Arabicarewidely used by Iraqi speakers in everyday language. Ithas been analyzed by following the cognitive theory of metaphor (Lakoff& Johnson,1980).The study indicates that the Iraqi speakerexperiences more of the metaphorical expressions of UP and DOWN to referto many of the abstract concepts that shape his/her impression of everyday life situations.
A stylistic study in the poetry of Hafiz Ibrahim, praise be to God, Lord of the worlds, and prayers and peace be upon his best messengers, and the seal of his prophets, Muhammad and his good and pure family, and after ...
The poet Hafez Ibrahim is considered one of the well-known poets in the modern era, and his language was distinguished by sobriety, eloquence in expressions, and beautiful meanings And he had my journey in the study of his poetry a stylistic study, and the research came with an introduction in which the concept of stylistics was briefly explained, since it was studied by many researchers, then divided the research into three topics: I studied in the first the construction of the poem, and I stood at the most importan
Abstract
The methods of the Principal Components and Partial Least Squares can be regard very important methods in the regression analysis, whe
... Show MoreClassifying an overlapping object is one of the main challenges faced by researchers who work in object detection and recognition. Most of the available algorithms that have been developed are only able to classify or recognize objects which are either individually separated from each other or a single object in a scene(s), but not overlapping kitchen utensil objects. In this project, Faster R-CNN and YOLOv5 algorithms were proposed to detect and classify an overlapping object in a kitchen area. The YOLOv5 and Faster R-CNN were applied to overlapping objects where the filter or kernel that are expected to be able to separate the overlapping object in the dedicated layer of applying models. A kitchen utensil benchmark image database and
... Show MoreThe heavy metals Cd, Cu, Fe, pb, and Zn were determined in dissolved and particulate phases of the water,in addition to exchangeable and residual phases of the sediment and in the selected organs of the fish Cyprinus carpio collected from the Euphrates River near Al-Nassiriya city center south of Iraq during the summer period / 2009 .Also sediment texture and total organic carbon(TOC) were measured. Analysis emploing a flam Atomic Absorption Spectrophotometers . The mean regional concentrations of the heavy metals in dissolved (µg/l) and particulate phases (µg/gm) dry weight were Cd (0.15,16.13) ,Cu (0.59,24.48) ,Fe (726,909.4) ,Pb (0.20, 49.95) and Zn (2.5,35.62) respectively,and those for exchangeable and residual phases of the
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show More