Atmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geometric optical law. So tracking is possible only in the range from 3 to 11 km, depending on tracking criteria. Target image size minimized to required ratio by using transfocation technique to overcome tracking filler, this technique uses zoom lens.
We find that atmospheric scintillation is affective parameter which reduced the maximum tracking range, and to avoid tracking failure at minimum and maximum range, the transfocation technique is suitable
Abstract
Prais be to Allah the Lord of the Worlds and prayers and peace be upon our faithfull Prophet …. I wrote this Research entitled (The Imam Shams AL-din Abdulrahman Bin Qudamah AL-Maqdsi (died: 682 A.H) Slections in Slections in proving contract annulment choice (AL-tassriah)and its duration which Iclarrified the reason of choosing this title and my method in writing Morever, a brief Overriew of the life of Imam Shams AL-din Bin Qudamah and the meaning of (AL-tassriah)and whether it proves to the buyer to return it, beside the duration which (the tassriah) proven, and a conclusion in which I showed the results I reached and some recommendations that some researchers in the field of Jurispruden
... Show MoreThe study aimed to identify the social support and its relation with death anxiety for
olds who are listed at the Palestinian ministry of social affairs in the Jerusalem governorate,
the researcher uses the descriptive method and she bases her research on two types of
criterion: the social support and the criterion of death anxiety, these two criterion are applied
on a stratified random sample, amounted to (184) of the elderly.
The results show no statistical differences in the level of social support for olds who
are listed at the Palestinian ministry of social affairs according to the variables of sex.
Whereas there are statistical differences in the level of social support for those olds according
to the variab
The study was designed in the northwestern part of Karbala city for the purpose of knowing the efficiency of some plant species of trees and shrubs planted by the municipality of the city to contribute to the deposition of dust particles suffered by the city's environment, in particular, as well as its ability to accumulate heavy metals in dust or soil, and to consider the study model for application in different parts of Iraq. It was found that the plant species (Acacia , Eucalyptus , Clkonukiyrs and Dodenia) in the studied area that were given the symbols (A,B,C and D respectively). Used the method of calculating the leaf area index to calculate the amount of dust drawn by the stock plant, then chemical digestion dry
... Show MoreThe current research aims to determine the requirements of Trends of International Mathematics and Science Study (TIMSS 2019) and to find out the extent to which the content of science textbooks for grades (1-4) in the Sultanate of Oman includes the requirements of (TIMSS 2019). Only the content dimension has been taken into account when conducting the content analysis. The study population includes all science books from the first to the fourth grade for the academic year 2021-2022. The study identified and organized the requirements in the study tool, which is a list of requirements of (TIMSS 2019). The results showed a general deficiency in all grades (1-4) in the content dimension including many main topics, subtopics, and objectives
... Show MoreCutaneous leishmaniasis (CL) is one of the most prevalent cutaneous parasitic protozoan infections in Iraq; characterized by a chronic infection and granulomatous disease that invades the skin. Type 1 immune was predominates in CL patients with exacerbated production of pro-inflammatory cytokine, therefore this study aimed to evaluate serum level of interferon gamma (IFN-γ) and monokine induce by interferon gamma (MIG/CXCl9) as a useful markers of disease development in patients during different stage of infection (<1 month .. early , 1-6 month.. chronic and >6 months.. late). The result showed that there was an early effort to eliminate the parasite proliferation which illustrated by a high significant increase of both IFN-γ
... Show MoreThis paper aims to study the rate of star formation (SFR) in luminous infrared galaxies at different wavelengths using distance measurement techniques (dl, dm) and to know which methods are the most accurate to determine the rate of star formation as we present through this research the results of the statistical analysis (descriptive statistics) for a sample of luminous infrared galaxies. The data used in this research were collected from the NASA Extragalactic Database (NED) and HYPERLEDA, then used to calculate the star formation rate and indicate the accuracy of the distance methods used (dl, dm). Two methods were tested on Hα, OII, FIR, radio continuum at 1.4 GHz, FUV, NUV, and total (FUV + FIR). The results showed that the dl
... Show MoreDielectric barrier discharges (DBD) can be described as the presence of contact with the discharge of one or more insulating layers located between two cylindrical or flat electrodes connected to an AC/pulse dc power supply. In this work, the properties of the plasma generated by dielectric barrier discharge (DBD) system without and with a glass insulator were studied. The plasma was generated at a constant voltage of 4 kV and fixed distance between the electrodes of 5 mm, and with a variable flow rate of argon gas (0.5, 1, 1.5, 2 and 2.5) L/min. The emission spectra of the DBD plasmas at different flow rates of argon gas have been recorded. Boltzmann plot method was used to calculate the plasma electron temperature (Te), and Stark broadeni
... Show MoreA new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More