Colloidal crystals (opals) made of close-packed polymethylmethacrylate (PMMA) were fabricated and grown by Template-Directed methods to obtain porous materials with well-ordered periodicity and interconnected pore systems to manufacture photonic crystals. Opals were made from aqueous suspensions of monodisperse PMMA spheres with diameters between 280 and 415 nm. SEM confirmed the PMMA spheres crystallized uniformly in a face-centered cubic (FCC) array. Optical properties of synthesized pores PMMA were characterized by UV–Visible spectroscopy. It shows that the colloidal crystals possess pseudo photonic band gaps in the visible region. A combination of Bragg’s law of diffraction and Snell’s law of refraction were used to calculate the sphere diameter. Finally, colloidal crystals were subjected to Z-scan experiment under pulsed Q-switched Nd:YAG laser illumination to characterize it for third order nonlinear optical properties. Z-scan results show the change in transmittance of a beam, and the nonlinear refractive index is n2 = 9.82787 x 10-12 (cm2/GW), while the nonlinear absorption coefficient β= 0.04673908 (cm/GW). These results were attributed to enhance the self-focusing arising from Kerr effect and the two-photon absorption.
As computers become part of our everyday life, more and more people are experiencing a
variety of ocular symptoms related to computer use. These include eyestrain, tired eyes, irritation,
redness, blurred vision, and double vision, collectively referred to as computer vision syndrome.
The effect of CVS to the body such as back and shoulder pain, wrist problem and neck pain.
Many risk factors are identified in this paper.
Primary prevention strategies have largely been confined to addressing environmental
exposure to ergonomic risk factors, since to date, no clear cause for this work-related neck pain
has been acknowledged. Today, millions of children use computers on a daily basis. Extensive
viewing of the compute
A flexible pavement structure usually comprises more than one asphalt layer, with varying thicknesses and properties, in order to carry the traffic smoothly and safely. It is easy to characterize each asphalt layer with different tests to give a full description of that layer; however, the performance of the whole; asphalt structure needs to be properly understood. Typically, pavement analysis is carried out using multi-layer linear elastic assumptions, via equations and computer programs such as KENPAVE, BISAR, etc. These types of analysis give the response parameters including stress, strain, and deflection at any point under the wheel load. This paper aims to estimate the equivalent Resilient Modulus (MR) of the asphalt concrete
... Show MoreHR Al-Hamami, AA Noaimi, MM Al-Waiz, AS Al-Kabraty, Iraqi Postgraduate Medical Journal, 2010 - Cited by 4
All - Mighty Allah is beautiful and loves beauty and Man is the only living that is given by the gift of Almighty Allah the ability to awareness of beauty and the taste of everything which recognized by him around all aspects of life.
So the children have more ability than others towards feeling the sense of beauty and the distinction between the beautiful and the ugly understanding , as they are attracted to the beauty , so we should promote and encourage their sense of beauty in future the beauty in behavior , in psychology and in the community, as well.
This is definitely be done through all of
... Show MoreFlutter is a phenomenon resulting from the interaction between aerodynamic and structural dynamic forces and may lead to a destructive instability. The aerodynamic forces on an oscillating airfoil combination of two independent degrees of freedom have been determined. The problem resolves itself into the solution of certain definite integrals, which have been identified as Theodorsen functions. The theory, being based on potential flow and the Kutta condition, is fundamentally equivalent to the conventional wing-ection theory relating to the steady case. The mechanism of aerodynamic instability has been analyzed in detail. An exact solution, involving potential flow and the adoption of the Kutta condition, has been analyzed in detail. Th
... Show MoreThis paper exclusively deals with medical encounters. . Structurally and thematically, it manifests itself in five parts. The First part deals with medical encounters as well as essential speech activities which cover (a) frames (certain types of talk) (b) the patient’s account and the patient’s story or more precisely the patient telling his story and (c) the act of questioning the patient. The Second part revolves round genre and register. The former, in most cases, suggests that the format of medical encounters is conversational. With register; we have a converse reality that restrictively tries to narrow things and give them a certain flavor. The Third part realizes the technicalities of medical encounters (a) the setting of an inte
... Show MoreMany of the elementary transformations of determinants which are used in their evaluation and in the solution of linear equations may by expressed in the notation of matrices. In this paper, some new interesting formulas of special matrices are introduced and proved that the determinants of these special matrices have the values zero. All formulation has been coded in MATLAB 7.
The world has seen in recent years as a result of rapid changes in the information and communication revolution until his limbs became distant as if a small screen can be controlled at the touch of which resulted in a stunning advance in all areas of life button, these changes were not accompanied by all the positive development, but it has many drawbacks on humans resulted in many of the psychological, social, intellectual and cultural problems.
As it is the cultural alienation of the most important challenges faced by the community in light of the tremendous technological progress and rapid jumps that exceeded all expectations in addition to the economic, social and political changes experienced by the country led to the desire
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show More