Laser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable
Atmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geom
... Show MoreA novel analytical method is developed for the determination of azithromycin. The method utilizes continuous flow injection analysis to enhance the chemiluminescence system of luminol, H2O2, and Cr(III). The method demonstrated a linear dynamic range of 0.001–100 mmol L-1 with a high correlation coefficient (r) of 0.9978, and 0.001–150 mmol L-1 with a correlation coefficient (r) of 0.9769 for the chemiluminescence emission versus azithromycin concentration. The limit of detection (L.O.D.) of the method was found to be 18.725 ng.50 µL−1 based on the stepwise dilution method for the lowest concentration within the linear dynamic range of the calibration graph. The relative standard deviation (R.S.D. %) for n = 6 was less than 1.2%
... Show MoreThe research has designed for studying the relationship between manufacturing strategy and its flexibility under the flexible manufacturing system with their reflection on the competitive environmental performance of the firm. To interpret and tackle the problem, a hypothesis has formulated stating that “ the competitive performance of a firm is interpreted by the manufacturing strategy and flexibility which are derived from the firm and its business strategies under the flexible manufacturing system”. Related literatures with their theoretical dissertations, which enhanced the thoughtful content, have analyzed. An illustrative case study on the flexible manufacturing system at Toyota Motors Corporation working at the g
... Show MorePeer-Reviewed Journal
Applying a well-performing heat exchanger is an efficient way to fortify the relatively low thermal response of phase-change materials (PCMs), which have broad application prospects in the fields of thermal management and energy storage. In this study, an improved PCM melting and solidification in corrugated (zigzag) plate heat exchanger are numerically examined compared with smooth (flat) plate heat exchanger in both horizontal and vertical positions. The effects of the channel width (0.5 W, W, and 2 W) and the airflow temperature (318 K, 323 K, and 328 K) are exclusively studied and reported. The results reveal the much better performance of the horizontal corrugated configuration compared with the smooth channel during both melti
... Show MoreIn this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More