Preferred Language
Articles
/
ijs-10688
Designing Cassegrain Telescope System with Best Obscuration Ratio of Secondary Mirror
...Show More Authors

     A computer simulation was conducted using Optics Software for Layout and Optimization (OSLO) to design a Cassegrain telescope system for on-axis rays. In order to establish such a telescope, the two mirrors of the optical system were designed as spherical surfaces: a concave mirror and a convex mirror. The obscuration ratios of the Cassegrain telescope's secondary mirror were examined using different values, which ranged between 0.1 and 0.3, to determine the best obscuration ratio. This work adopted three criteria to decide which obscuration ratio is the best for the Cassegrain telescope. The first criterion was the number of rays that reached the final image. The second criterion was calculating the modulation transfer function (MTF). The third criterion was calculating the point spread function (PSF) and Strehl ratio (SR). Finally, the result showed that the best obscuration ratio of the telescope’s secondary mirror was found at D2/D1=0.116-0.166, where D1=0.76 m for the primary mirror and D2=0.09 – 0.125m for the secondary mirror.

 

 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Automatic Object Detection, Labelling, and Localization by Camera’s Drone System
...Show More Authors

This work explores the designing a system of an automated unmanned aerial vehicles (UAV( for objects detection, labelling, and localization using deep learning. This system takes pictures with a low-cost camera and uses a GPS unit to specify the positions. The data is sent to the base station via Wi-Fi connection.

The proposed system consists of four main parts. First, the drone, which was assembled and installed, while a Raspberry Pi4 was added and the flight path was controlled. Second, various programs that were installed and downloaded to define the parts of the drone and its preparation for flight. In addition, this part included programs for both Raspberry Pi4 and servo, along with protocols for communication, video transmi

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Wed Feb 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
Supra-Approximation Spaces Using Mixed Degree System in Graph Theory
...Show More Authors

This paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.

Publication Date
Fri Jan 01 2010
Journal Name
Int. J. Adv. Comp. Techn.
Adding PC Connectivity to the MTS-88 Microcomputer Teaching System
...Show More Authors

The MTS-88. c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembly. It has the problem that long programs cannot be traced and tested efficiently. A simple error may cause all the code to be erased and the system to stop responding. Also, this system lacks the ability to be connected to the PC. The aim of this work is to modify the system to make it possible to be connected to the PC through the parallel port. This gives the capability to download long programs to the system after being developed in the PC. The 8255 Programmable Peripheral Interface available in the teaching system is interfaced to the parallel port and used as

... Show More
Publication Date
Mon Nov 03 2008
Journal Name
All Days
Correlations for Optimum Separation Pressures for Sequential Field Separation System
...Show More Authors
ABSRACT<p>A study has been done to find the optimum separators pressures of separation stations. Stage separation of oil and gas is accomplished with a series of separators operating at sequentially reduced pressures. Liquid discharged from a higher pressure separator into the lower pressure separator. The set of working separators pressures which yield maximum recovery of liquid hydrocarbon from the well fluid is the optimum set of pressures which is the target of this work.</p><p>Computer model is used to find the optimum separators pressures. The model employs the Peng-Robinson equation of state for volatile oil. Application of this model shows good improvement of al</p> ... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
design Electronic cost accounting system for the Iraqi Airways Company
...Show More Authors

The research Was based to on a real problem and realistically of represented by that  Iraqi Airways company does not have the electronic cost accounting system and therefore  be the process of  the pricing various services provided by a company sample research respecting  air transport and air cargo and aviation fuel and services and catering are not properly especially in the presence of new data from the new companies entering competition in Iraqi aviation industry and therefore does not provide price flexibility in order to compete in getting market share, And then research this problem addressed through design an electronic cost Accounting system covers all the costs incurred by the compan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Header-Words Based for Printed Arabic Document Images Retrieval System
...Show More Authors

Printed Arabic document image retrieval is a very important and needed system for many companies, governments and various users. In this paper, a printed Arabic document images retrieval system based on spotting the header words of official Arabic documents is proposed. The proposed system uses an efficient segmentation, preprocessing methods and an accurate proposed feature extraction method in order to prepare the document for classification process. Besides that, Support Vector Machine (SVM) is used for classification. The experiments show the system achieved best results of accuracy that is 96.8% by using polynomial kernel of SVM classifier.

View Publication Preview PDF
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Pose Invariant Palm Vein Identification System using Convolutional Neural Network
...Show More Authors

Palm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (2)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref