Preferred Language
Articles
/
ijs-10688
Designing Cassegrain Telescope System with Best Obscuration Ratio of Secondary Mirror
...Show More Authors

     A computer simulation was conducted using Optics Software for Layout and Optimization (OSLO) to design a Cassegrain telescope system for on-axis rays. In order to establish such a telescope, the two mirrors of the optical system were designed as spherical surfaces: a concave mirror and a convex mirror. The obscuration ratios of the Cassegrain telescope's secondary mirror were examined using different values, which ranged between 0.1 and 0.3, to determine the best obscuration ratio. This work adopted three criteria to decide which obscuration ratio is the best for the Cassegrain telescope. The first criterion was the number of rays that reached the final image. The second criterion was calculating the modulation transfer function (MTF). The third criterion was calculating the point spread function (PSF) and Strehl ratio (SR). Finally, the result showed that the best obscuration ratio of the telescope’s secondary mirror was found at D2/D1=0.116-0.166, where D1=0.76 m for the primary mirror and D2=0.09 – 0.125m for the secondary mirror.

 

 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 02 2024
Journal Name
International Development Planning Review
DESIGNING AN AUXILIARY DEVICE AND ITS IMPACT ON LEARNING THE SKILLS OF ANGULAR SUPPORT AND OPEN SUPPORT FOR HANDSTAND PUSH-UPS ON THE PARALLEL APPARATUS IN ARTISTIC GYMNASTICS FOR BUDS
...Show More Authors

Publication Date
Fri Jan 05 2024
Journal Name
Al-academy
THE SYSTEM OF SHAPE IN SOME OF PICASSOS CERAMICS
...Show More Authors

Picasso ceramics represented illuminated sign in ceramic art and excelled in accord ceramic art dimension aesthetically, and put it in a new prospects, despite the simplicity of the forms turn into a magical images and multiple interpretations.
So the search deliberately to choose purposive (37) samples divided into four groups, as follows: -
A flat shapes / palets or saucers / the vases /modified vases .
benefiting from indicators were spawned from literature ,to analyzing samples within the totals for the identification systems act forming art work`s:-
(1)Picasso's ceramic work product of a deliberate process represented a capacity of technical experience, and formal
(2)The system configuration in the ceramic art works c

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Qualitative and Quantitative Studies of the Effects of Spherical Aberration on the Optical System in the Cases of Coherent and Incoherent Illumination
...Show More Authors

In this paper, we study the effects of coherent and incoherent illumination on the optical imaging system. The effects were studied qualitatively in terms of Point Spread Function (PSF) and Modulation Transfer Function (MTF), and quantitatively in terms of Root Mean Square Error (RMSE). Different values of radius of aperture were investigated in the presence and absence of spherical aberration with various magnitudes of spherical aberration (M=1, 2, and 3). The experiments were performed using homogeneous media.

     The results show that imaging with incoherent illumination is better than imaging with coherent illumination, especially for small aperture. Also, we found that the effects of spherical aberration

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Apr 29 2018
Journal Name
Iraqi Journal Of Science
Semantic Based Video Retrieval System: Survey
...Show More Authors

In this review paper a number of studies and researches are surveyed, in order to assist the upcoming researchers, to know about the techniques available in the field of semantic based video retrieval. The video retrieval system is used for finding the users’ desired video among a huge number of available videos on the Internet or database. This paper gives a general discussion on the overall process of the semantic video retrieval phases. In addition to its present a generic review of techniques that has been proposed to solve the semantic gap as the major scientific problem in semantic based video retrieval. The semantic gap is formed because of the difference between the low level features that are extracted from video content and u

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Journal Of Pharmacy Research
Pulsatile drug delivery system-review article
...Show More Authors

Pulsatile drug delivery systems (PDDS) are developed to deliver drug according to circadian behavior of diseases. They deliver the drug at the right time, action and in the right amount, which provides more benefit than conventional dosages and increased patient compliance. The drug is released rapidly and completely as a pulse after a lag time. These systems are beneficial for drugs with chrono-pharmacological behavior, where nighttime dosing is required and for the drugs having a high first-pass effect and having specific site of absorption in the gastrointestinal tract. This article covers methods and marketed technologies that have been developed to achieve pulsatile delivery. Diseases wherein PDDS are promising include asthma, peptic u

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 24 2018
Journal Name
Journal Of Pharmacy Research
Transdermal drug delivery system: A review
...Show More Authors

Transdermal drug delivery has made an important contribution to medical practice but has yet to fully achieve its potential as an alternative to oral delivery and hypodermic injections. Transdermal therapeutic systems have been designed to provide controlled continuous delivery of drugs through the skin to the systemic circulation. A transdermal patch is an adhesive patch that has a coating of drug; the patch is placed on the skin to deliver particular amount of drug into the systemic circulation over a period of time. The transdermal drug delivery systems (TDDS) review articles provide information regarding the transdermal drug delivery systems and its evaluation process as a ready reference for the research scientist who is involved

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Dewatering System Control by MATLAB Software
...Show More Authors

The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.

View Publication Preview PDF
Crossref