Lasers, with their unique characteristics in terms of excellent beam quality, especially directionality and coherency, make them the solution that is key for many processes that require high precision. Lasers have good susceptibility to integrate with automated systems, which provides high flexibility to reach difficult zones. In addition, as a processing tool, a laser can be considered as a contact-free tool of precise tip that became attractive for high precision machining at the micro and nanoscales for different materials. All of the above advantages may be not enough unless the laser technician/engineer has enough knowledge about the mechanism of interaction between the laser light with the processed material. Several sequential phenom
... Show MoreThe study involved isolation and characterization of E.coli from patient’s infected with diarrhea , in order to study the ability of the bacteria to produce cytosine deaminase (CD). Result showed eight isolates of E.coli which showed adifference in the production of (CD) and the isolate of E. coli E33 was the beast of its production of CD than the other’s and the value of the specific activity was 4.920 u/mg protein , when grown in the medium which contains 1% glycerol ,3% peptone as a source of Carbon and Nitrogen respectively with pH 8. The optimum cultural condition‘s for the production of CD from E. coli E33 was studied the result‘s showed that the isolate gave the
... Show MoreIn this paper, we generalized the principle of Banach contractive to the relative formula and then used this formula to prove that the set valued mapping has a fixed point in a complete partial metric space. We also showed that the set-valued mapping can have a fixed point in a complete partial metric space without satisfying the contraction condition. Additionally, we justified an example for our proof.
Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Developing smart city planning requires integrating various techniques, including geospatial techniques, building information models (BIM), information and communication technology (ICT), and artificial intelligence, for instance, three-dimensional (3D) building models, in enabling smart city applications. This study aims to comprehensively analyze the role and significance of geospatial techniques in smart city planning and implementation. The literature review encompasses (74) studies from diverse databases, examining relevant solutions and prototypes related to smart city planning. The focus highlights the requirements and preparation of geospatial techniques to support the transition to a smart city. The paper explores various aspects,
... Show MoreGovernance is a relatively modern term, specially in Arabic, it represents the Arabic translation of English word "Governance", This term refers to standards, approaches and policies to achieve quality and excellence in their application, the need to use these standards has emerged in the legislative field.
Good legislation is characterized by efficiency, realism, transparency, fairness and predictability by those who address them.
This research focuses on subjecting performance evaluation legislation to legislative governance standards to make this legislation high quality and effective.
Evaluate Experience of Islamic Education in kindergartens
Augmented Reality (AR) is one of the technological developments in recent years that uses the real world as a basic pillar and enhances it by overlaying virtual objects created by computers. The study provides an overview of the use of augmented reality technology in meeting one of the most important requirements of cultural tourism: highlighting cultural and historical heritage. Accordingly, the research problem concentrated on the lack of local literature associated with the use of augmented reality in cultural tourism. It aimed to fill this gap by building a knowledge base and demonstrating the potential of augmented reality in this field. Hence, the importance of research in drawing the attention of tourism practitio
... Show More