Preferred Language
Articles
/
ijp-817
Transfocation Technique to Overcome Atmospheric Scintillation Effect on a Laser Detection and Tracking System (LDTS)
...Show More Authors

Atmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geometric optical law. So tracking is possible only in the range from 3 to 11 km, depending on tracking criteria. Target image size minimized to required ratio by using transfocation technique to overcome tracking filler, this technique uses zoom lens.
We find that atmospheric scintillation is affective parameter which reduced the maximum tracking range, and to avoid tracking failure at minimum and maximum range, the transfocation technique is suitable

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Electronic diagnostics system for the analysis of laser beam profile
...Show More Authors

In this work the analysis of laser beam profile system ,using a two dimensional CCD (Charge Coupled Device) arrays, is established. The system is capable of producing video graphics that give a two dimensional image of laser beam. The video graphics system creates color distribution that represent the intensity distribution of the laser beam or the energy profile of the beam. The software used is capable of analyzing and displaying the profile in four different methods that is , color code intensity contouring , intensity shareholding, intensity cross section along two dimension x-y, and three dimensional plot of the beam intensity given in the same display.

View Publication Preview PDF
Publication Date
Thu Aug 17 2017
Journal Name
Engineering And Technology Journal
Effect of Laser Surface Melting on Chromium Carbide of 304 Stainless Steels
...Show More Authors

SKF Sami I. Jafar, Mohammad J. Kadhim, Engineering and Technology Journal, 2018 - Cited by 4

View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Theoretical Study of The Heating Effect of Laser Radiations on SiUcaGlass Systems
...Show More Authors

A theoretical study has been proposed to investigate the effects of different laser radiations (Nd - glass, DF and C02) as a heating source on different glass samples (Optical glass, Bk - 7 and Soda - lime glass) and different waves lengths (10.6, 3.8, 1.6) ???. The heat changes as which are resulted due irradiation with laser sources have been determined by using the one dimension mathematical relation as a function of time (t) and depth (z). The results of the study show ed that the irradiation with C02 laser had a greater effect than DF laser, while the effects of Nd - glass laser were minimal with a power density of (1.8*10?? w/m2) within atime(l^sec).(Forboth Kinds) The change in the temperatures were not exceeded than (70"K) in all sa

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 16 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Irradiation effect of 780-805nm diode laser on wound healing in mice
...Show More Authors

Background: Wound healing is a complicated, interactive, integrative process involving cellular and chemotactic activity, the release of chemical mediators and associated vascular response which includes number of phases: inflammatory phase, proliferative phase and remodeling phase. Low level laser therapy can be more effective in the three overlapping phases of wound healing. Biostimulation appears to have an effect on the cellular level, by increasing cellular function and stimulating various cells. The aim of present study was to evaluate histologically the effect of 780-805 diode laser the intensity of inflammation and pattern of epithelization in mice model. Material and methods: The experimental study was performed on ninety six white

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Oncology And Radiotherapy
The Effect of Green Low Laser (LLL) on the white blood cells on platelet on people on brain and prostate cancer
...Show More Authors

The effect of Low-Level Laser (LLL) provided by green semiconductor laser with an emission wavelength of 532 nm on of human blood of people with brain and prostate cancer has been investigated. The effect of LLL on white blood cell (WBC), NEUT, LYMPH and MONO have been considered. Platelet count (PLT) has also been considered in this work. 2 ml of blood sample were irradiating by a green laser of the dose of 4.8 J/cm2. The results suggest a potential effect of LLL on WBC, PLT, NEUT, LYMPH, and MONO of people with brain and prostate cancer Key words: white blood cell , platelet , low-level laser therapy

Publication Date
Sat Dec 17 2022
Journal Name
Scientometrics
Implementation of a new research indicator to QS ranking system
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Sep 12 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
The influence of fear on the dynamic of an eco-epidemiological system with predator subject to the weak Allee effect and harvesting
...Show More Authors

In this paper, an eco-epidemiological prey-predator system when the predator is subjected to the weak Allee effect, and harvesting was proposed and studied. The set of ordinary differential equations that simulate the system’s dynamic is constructed. The impact of fear and Allee’s effect on the system's dynamic behavior is one of our main objectives. The properties of the solution of the system were studied. All possible equilibrium points were determined, and their local, as well as global stabilities, were investigated. The possibility of the occurrence of local bifurcation was studied. Numerical simulation was used to further evaluate the global dynamics and understood the effects of varying parameters on the asymptotic behavior of t

... Show More
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref