The aim of this research is to design and construct a
semiconductor laser range finder operating in the near infrared range
for ranging and designation. The main part of the range finder is the
transmitter which is a semiconductor laser type GaAs of wavelength
0.904 μm with a beam expander and the receiver; a silicon pin
detector biased to approve the fast response time with it's collecting
optics. The transmitters pulse width was 200ns at a threshold current
of 10 Ampere and maximum operating current of 38 Ampere. The
repetition rate was set at 660Hz and the maximum operating output
power was around 1 watt. The divergence of the beam was 0.268o
the efficiency of the laser was 0.03% at a duty cycle of 1.32x10-4.
Special software (ZEMAX EE 2000) was implemented for optimum
optical design.
Assume that G is a finite group and X = tG where t is non-identity element with t3 = 1. The simple graph with node set being X such that a, b ∈ X, are adjacent if ab-1 is an involution element, is called the A4-graph, and designated by A4(G, X). In this article, the construction of A4(G, X) is analyzed for G is the twisted group of Lie type 3D4(3).
Over the last few years, the interior designer has been given the ability to access many innovative tools for new forms of unprecedented diversity and efficiency. Some design experts have described the new parametric procedures they are introducing to create new interior projects as a radical transformation that carries all the elements of a qualitative shift in interior design. The best of these parametric procedures is the technical capabilities offered by us to create new forms that are different from what has been discussed in everything that has been produced by designers and architects since modernity and even before it to the present time, which returns our design products through a series of computer programs that perform the pro
... Show MoreIn present work the effort has been put in finding the most suitable color model for the application of information hiding in color images. We test the most commonly used color models; RGB, YIQ, YUV, YCbCr1 and YCbCr2. The same procedures of embedding, detection and evaluation were applied to find which color model is most appropriate for information hiding. The new in this work, we take into consideration the value of errors that generated during transformations among color models. The results show YUV and YIQ color models are the best for information hiding in color images.
This research has discussed the origins of ESP, addressed key notions about ESP and examined issues in ESP syllabus design. The content of the paper was determined by a need identified based on my experience as an ESL instructor designing and delivering the content-based language program - Language Preparation for the Cadets and Employment in the Iraqi College of Police . These issues, where possible, have been supported by current and pertinent academic literature. It is my sincerest hope that these observations will lend insight into the challenges facing the ESL instructor acting as ESP syllabus developer.
The current research dealt with the rapid development of industrial product design in recent times, and this development in the field of design led to the emergence of modern trends in many terms and theories to direct greater interest in the cognitive foundations of design and its relationship with the components of other natural sciences, and despite the impressive technological development, nature remains With its content of formative values and structural dimensions, it is the first source of inspiration and the source of all modern mathematical sciences and theories, as God made them tend towards organization to continue to provide us with endless inspiration. Hence, the fractional one, which is an important part of dedicating the d
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreBackground: Febrile convulsions are the most frequent type of seizures in children under 6 years of age. Significant percentage of these children will later suffer from recurrence of febrile convulsion.Objectives: To identify the main risk factors for recurrent febrile convulsions in children.Methods: we carried out a case control study involving 89 children those who experienced first attack of febrile convulsions and 92 children with recurrent attack of febrile convulsions. The study was conducted in Central Children Teaching Hospital, Baghdad during the period 2006- 2007. Results: Compared to children with first attack of febrile convulsion, children with recurrent seizures were younger at onset (4- 12m) (67% vs. 44%), mainly male (70
... Show More