The present work aims to achieve pulsed laser deposition ofTiO2 nanostructures and investigate their nonlinear properties using z-scan technique.The second harmonic Q-switched Nd: YAG laser at repetition rate of 1Hz and wavelength of 532 nm with three different laser fluencies in the range of 0.77-1.1 J/cm2 was utilized to irradiate the TiO2 target. The products of laser-induced plasma were characterized by utilizing UV-Vis absorption spectroscopy, x-ray diffraction (XRD), atomic force Microscope (AFM),and Fourier transform infrared (FTIR). A reasonable agreement was found among the data obtained usingX-Ray diffraction, UV-Vis and Raman spectroscopy. The XRD results showed that the prepared TiO2 thin films were all crystallite structure with no impurity peaks of other elements. Also, their peak intensities were increased with increasing the ablating laser fluency. AFM measurements indicated that,during pulsed laser deposition, as the laser fluency was increased, the average diameter of the prepared TiO2 nanoparticles (TiO2 NPs)was decreased from 86 to 57 nm, althoughthe differences were increased with the increase in the laser fluency. The multiphoton absorption was investigated using ultra-fast femtosecond laser with the z-scan method.The impact of thickness of the prepared films on the non-linear absorption coefficient was studied as well.
Zinc Oxide nanoparticles were prepared using pulsed laser ablation process from a pure zinc metal placed inside a liquid environment. The latter is composed of acetyltrimethylammonium bromide (CTAB) of 10−3 molarity and distilled water. A Ti:Sapphire laser of 800 nm wavelength, 1 kHz pulse repetition rate, 130 fs pulse duration is used at three values of pulse energies of 0.05 mJ, 1.11 mJ and 1.15 mJ. The evaluation of the optical properties for the obtained suspension was applied through ultraviolet–visible absorption spectroscopy test (UV/VIS). The result showed peak wavelengths at 210 nm, 211 nm and 213 nm for the three used pulse energies 0.05 mJ, 1.11 mJ and 1.15 mJ respectively. This indicates a blue shift,
... Show MoreThe main objective of this paper is to designed algorithms and implemented in the construction of the main program designated for the determination the tenser product of representation for the special linear group.
ان الغرض من هذا البحث هو المزج بين القيود الضبابية والاحتمالية. كما يهدف الى مناقشة اكثر حالات مشكلات البرمجة الضبابية شيوعا وهي عندما تكون المشكلة الضبابية تتبع دالة الانتماء مرة دالة الاتنماء المثلثية مرة اخرى، من خلال التطبيق العملي والتجريبي. فضلا عن توظيف البرمجة الخطية الضبابية في معالجة مشكلات تخطيط وجدولة الإنتاج لشركة العراق لصناعة الأثاث، وكذلك تم استخدام الطرائق الكمية للتنبؤ بالطلب واعتماده
... Show MoreAbstract
This research deals will the declared production planning operation in the general company of planting oils, which have great role in production operations management who had built mathematical model for correct non-linear programming according to discounting operation during raw materials or half-made materials purchasing operation which concentration of six main products by company but discount included just three products of raw materials, and there were six months taken from the 1st half of 2014 as a planning period has been chosen . Simulated annealing algorithm application on non-linear model which been more difficulty than possible solution when imposed restric
... Show More: In this study, a linear synchronous machine is compared with a linear transverse flux machine. Both machines have been designed and built with the intention of being used as the power take off in a free piston engine. As both topologies are cylindrical, it is not possible to construct either using just flat laminations and so alternative methods are described and demonstrated. Despite the difference in topology and specification, the machines are compared on a common base in terms of rated force and suitability for use as a generator. Experience gained during the manufacture of two prototypes is described.
Steganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.
... Show MoreIn this paper, we introduce the bi-normality set, denoted by , which is an extension of the normality set, denoted by for any operators in the Banach algebra . Furthermore, we show some interesting properties and remarkable results. Finally, we prove that it is not invariant via some transpose linear operators.
This research is concerned with the study of (the aesthetic of constructive relations in linear composition) with what distinguished Arabic calligraphy through the style and artistic method in its construction, and the specifications it carries that enabled it to pay attention to building formations to achieve in its total linear ranges aesthetic values and relationships. Through the research, the models and the exploratory study that he obtained, the researcher was able to raise the research problem in the first chapter according to the following question: What is the aesthetic of constructive relations in linear formation?
The importance of the research in achieving the aesthetics of the formations, which is a wide field according t
In this paper, the homotopy perturbation method is presented for solving the second kind linear mixed Volterra-Fredholm integral equations. Then, Aitken method is used to accelerate the convergence. In this method, a series will be constructed whose sum is the solution of the considered integral equation. Convergence of the constructed series is discussed, and its proof is given; the error estimation is also obtained. For more illustration, the method is applied on several examples and programs, which are written in MATLAB (R2015a) to compute the results. The absolute errors are computed to clarify the efficiency of the method.