Preferred Language
Articles
/
ijp-817
Transfocation Technique to Overcome Atmospheric Scintillation Effect on a Laser Detection and Tracking System (LDTS)
...Show More Authors

Atmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geometric optical law. So tracking is possible only in the range from 3 to 11 km, depending on tracking criteria. Target image size minimized to required ratio by using transfocation technique to overcome tracking filler, this technique uses zoom lens.
We find that atmospheric scintillation is affective parameter which reduced the maximum tracking range, and to avoid tracking failure at minimum and maximum range, the transfocation technique is suitable

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effect of Thickness on Some Optical Properties of Fe2O3 Thin Films Prepared by Chemical Spray Pyrolysis Technique
...Show More Authors

  The paper reports the influence of the thickness on the some optical properties of Fe2O3 thin films,which were prepared by chemical Spray  pyrolysis technique on glass substrate heated to 400Ëšc.The thickness of thin films (250,280,350)nm were measured by using weighting method. The optical properties include the absorbance and reflectance spectra,extinction coefficient,and real and imaginary part of the dielectric constant.The result  showed that the optical constant(k,εr,εi)decreased with the increase of the thickness.

View Publication Preview PDF
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effect of Annealing Temperature on the Structural and Optical Properties of The CdO Thin Films Prepared By Vacuum Evaporation Thermal Technique
...Show More Authors

      Cadmium Oxide films have been prepared by vacuum evaporation technique on a glass substrate at room temperature. Structural and optical properties of the films are studied at different annealing temperatures (375 and 475) ËšC, for the thickness (450) nm at one hour. The crystal structure of the samples was studied by X- ray diffraction. The highest value of the absorbance is equal to (78%) in the wavelength (530) nm, at annealing temperature (375) ËšC. The value of at a rate of deposition is (10) nm/s. The value of optical energy gap found is equal to (2.22) eV.

View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Experimental Evaluation of the Performance of One-Axis Daily Tracking and Fixed PV Module in Baghdad, Iraq
...Show More Authors

An attempt was made to evaluate the PV performance of one-axis daily tracking and fixed system for Baghdad, Iraq. Two experimental simulations were conducted on a PV module for that purpose. Measurements included incident solar radiation, load voltage and load current. The first experiment was carried out for six months of winter half of year to simulate the one-axis daily tracking. The azimuth angle was due south while the tilt angle was being set to optimum according to each day of simulation. The second experiment was done at one day to simulate the PV module of fixed angles. It is found that there is a significant power gain of 29.6% for the tracking system in respect to the fixed one. The one-axis daily tracking was much more effect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 26 2020
Journal Name
Iraqi Journal Of Science
Effects of Laser at 810 Nm on Wound Healing in Albino Mice
...Show More Authors

Many researches focused on laser therapy of wound healing in different animal models due to the lack of a standard protocol in the application of such phototherapy. Objective:  To study the effects of 810nm laser at a constant irradiance of 41.63 mw/cm2 and exposure (illumination) time of 5,15  minutes on wounds created on Albino mice (BALB/c).

     Skin wound with elliptic shape and full thickness was created on the dorsal side of  â€˜45 mature male albino mice. Irradiated animals were divided into two main groups based on irradiation time, the first was irradiated for 5 min and the second for 15 min, each was subdivided into three subgroups (n=5) according to number of treatment

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
The Limitation of Pre-processing Techniques to Enhance the Face Recognition System Based on LBP
...Show More Authors

Most systems are intelligent and the industrial world is moving now towards
technology. Most industrial systems are now computerized and offer a high speed.
However, Face recognition is a biometric system that can identify people from their
faces. For few number of people to be identified, it can be considered as a fast
system. When the number of people grew to be bigger, the system cannot be adopted
in a real-time application because its speed will degrade along with its accuracy.
However, the accuracy can be enhanced using pre-processing techniques but the
time delay is still a challenge. A series of experiments had been done on AT&TORL
database images using Enhanced Face Recognition System (EFRS) that is

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Preparation and Characterization of TiO2 Nanoparticles With and Without Magnetic Field Effect Via Hydrothermal Technique
...Show More Authors

     With and without the use of magnetic fields, titanium dioxide (TiO2) nanoparticles were synthesized using the hydrothermal method at extremely high temperatures and pressures. Titanium tetra isopropoxide [Ti(C12H28O4)] was used for the preparation, which was performed at pH 7 and under temperatures of 160 and 190 ˚C. UV spectroscopy, XRD crystallography, FE-SEM microscopy were used for characterizations. From UV spectroscopy, the energy gap values were clearly affected by the increase in temperature and the presence of the magnetic field. At the temperatures of 160 and 190 oC for TiO2 without magnetic field, FE-SEM microscopy images have shown an average c

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.