In this research constructed N2 laser system by use developed method of electric discharge. In this method used four step of electric discharge by using four capacitors, three spark gaps, high tension power supply varying in range from 12kV to 24 kV and three resistors, this method called three stage blumlein circuit. The breakdown time delay of these parallel spark gaps cement strong ultraviolet preionization in the laser channel, thus the result of these amendments the laser output is many doubled and is more increasing than that obtained using the one and two stage blumlein circuits. This system has been designed and operated to give pulse laser with wavelength at 337.1 nm. This laser system can operate without mirrors and optical resonator. The best result of energy was about (20.2 mJ) at electrode separation (3.5 mm) with flow rate (13 L/min) and applied voltage (24 kV). With this conditions of electric discharges the pulse duration was (6.65 ns) then the peak power was (3.04 MW), the efficiency of convert the electric energy to optical energy was (0. 93%) and The divergence of laser beam at optimal condition was (0.348 mrad). The results of fabricated system indicate the output characteristics can be significantly improved by improving the discharge characteristics.
In this paper, an adaptive integral Sliding Mode Control (SMC) is employed to control the speed of Three-Phase Induction Motor. The strategy used is the field oriented control as ac drive system. The SMC is used to estimate the frequency that required to generates three phase voltage of Space Vector Pulse Width Modulation (SVPWM) invertor . When the SMC is used with current controller, the quadratic component of stator current is estimated by the controller. Instead of using current controller, this paper proposed estimating the frequency of stator voltage since that the slip speed is function of the quadratic current . The simulation results of using the SMC showed that a good dynamic response can be obtained under load
... Show MoreComputer vision seeks to mimic the human visual system and plays an essential role in artificial intelligence. It is based on different signal reprocessing techniques; therefore, developing efficient techniques becomes essential to achieving fast and reliable processing. Various signal preprocessing operations have been used for computer vision, including smoothing techniques, signal analyzing, resizing, sharpening, and enhancement, to reduce reluctant falsifications, segmentation, and image feature improvement. For example, to reduce the noise in a disturbed signal, smoothing kernels can be effectively used. This is achievedby convolving the distributed signal with smoothing kernels. In addition, orthogonal moments (OMs) are a cruc
... Show MoreBACKGROUND: Three-dimensional (3D) printing is an evolving technology that has been used recently in a wide spectrum of applications. AIM: The objective is to evaluate the application of 3D printing in various neurosurgical practice. PATIENTS AND METHODS: This pilot study was conducted in the neurosurgical hospital in Baghdad/Iraq between July 2018 and July 2019. An X, Y, and Z printer was used. The working team included neurosurgeons, biomedical engineers, and bio-technicians. The procedure starts with obtaining Magnetic resonance imaging (MRI) or computed tomography (CT) scan in particular protocols. The MRI, and CT or angiography images were imported into a 3D programmer for DICOM images called 3D slice where these files con
... Show MoreGenerally, radiologists analyse the Magnetic Resonance Imaging (MRI) by visual inspection to detect and identify the presence of tumour or abnormal tissue in brain MR images. The huge number of such MR images makes this visual interpretation process, not only laborious and expensive but often erroneous. Furthermore, the human eye and brain sensitivity to elucidate such images gets reduced with the increase of number of cases, especially when only some slices contain information of the affected area. Therefore, an automated system for the analysis and classification of MR images is mandatory. In this paper, we propose a new method for abnormality detection from T1-Weighted MRI of human head scans using three planes, including axial plane, co
... Show MoreThree cohesionless free flowing materials of different density were mixed in an air fluidized bed to study the mixing process by calculating performance of mixing index according to Rose equation (1959) and to study the effect of four variables (air velocity, mixing time, particle size of trace component and concentration of trace component) on the mixing index and as well as on mixing performance. It was found that mixing index increases with increasing the air velocity, mixing time and concentration of trace component until the optimum value. Mixing index depends on the magnitude of difference in particle size The first set of experiments (salt then sand then cast iron) give higher mixing index and better performance of mixing than the
... Show MoreIn this paper we reported the microfabrication of three-dimensional structures using two-photon polymerization (2PP) in a mixture of MEH-PPV and an acrylic resin. Femtosecond laser operating at 800nm was employed for the two-photon polymerization processes. As a first step in this project we obtained the better composition in order to fabricate microstructers of MEH-PPV in the resin via two-photon polymerzation. Acknowledgement:This research is support by Mazur Group, Harvrad Universirt.
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreThe accurate 3-D coordinate's measurements of the global positioning systems are essential in many fields and applications. The GPS has numerous applications such as: Frequency Counters, Geographic Information Systems, Intelligent Vehicle Highway Systems, Car Navigation Systems, Emergency Systems, Aviations, Astronomical Pointing Control, and Atmospheric Sounding using GPS signals, tracking of wild animals, GPS Aid for the Blind, Recorded Position Information, Airborne Gravimetry and other uses. In this paper, the RTK DGPS mode has been used to create precise 3-D coordinates values for four rover stations in Baghdad university camp. The HiPer-II Receiver of global positioning system was used to navigate the coordinate value. The results wil
... Show More