Surface structural features and optical analysis of nanostructured Cu-oxide thin film coatings coated via the sol-gel dip coating method
...Show More Authors
In this paper the method of singular value decomposition is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.
In this research, we tackled the idea of absence and what companies it of interpretations and human, textual, philosophical and explanatory concerns. We also tackled the features and drawing them and identifying and lighting them by Ali Abdunnabi Az-Zaidi and how he read them as an Iraqi who writes in order to express a social, intellectual, political and religious reality in some of its aspects. The idea of absence and what accompanies it of pain or heartbreak or human change was a rich subject for all the writers and authors in the Iraqi theatre, and Ali Abdunnabi Az-Zaidi was one of them and the closest and most affected by it, who deserves discussion, explanation and briefing. The research problem was looking for the nature of absenc
... Show MoreAbstract: Reflection optical fibre Humidity sensor is presented in this work, which is based on no core fibre prepared by splicing a segment of no core fibre (NCF) at different lengths 1-6 cm with fixed diameter 125 µm and a single mode fibre (SMF). The range of humidity inside the chamber is controlled from 30% to 90% RH at temperature ~ 30 °С. The experimental result shows that the resonant wavelength dip shift decreases linearly with an increment of RH% and the sensitivity of the sensor increased linearly with an increasing in the length of NCF. However, a high sensitivity 716.07pm/RH% is obtained at length 5cm with good stability and reputability. Furthermore, the sensor is shif
... Show MoreSchmidt Cassegrain spider obscuration telescope (SCT) is one of the types of observations operating with a concave mirror. It combines several lenses and mirrors working together as an optical system. The light rays fall into the tube from the main mirror and gather on another smaller mirror called a secondary mirror. Unlike the formation of Newton's telescope, no light is made from the secondary mirror out the side of the tube but is directed to the middle of the main mirror. There is an opening in the middle of the main mirror so the light beam can go out and direct the vision lens system. The secondary mirror is located in the middle of a glass slice and is installed by thin carriers. The function of this board is to correct the portr
... Show MoreFilms of pure polystyrene (ps) and doped by bromothymol blue material with percentages(4%) prepared by using casting technique in room temperature , the absorption and transmission spectra has been recorded in the wavelength rang (200-900)nm and calculated refractive index , reflectivity, real and imaginary parts of dielectric constant and extinction coefficient . this study has been done by recording the absorption and transmission spectra by using spectrophotometer .
The aim of this research is to study the optical properties of carbon-magnesium plasma resulting from arc discharge with explosive wire technique, where the energy gap of each of carbon and magnesium and the carbon-magnesium bond for three values of the wire exploding current (50,75,100 amperes) was studied. It was found that the energy gap for each of carbon and magnesium decreases with increasing the current, the X-ray diffraction of magnesium and the carbon-magnesium suspension was studied, and FTIR of the carbon-magnesium suspended carbon was studied for three values of the exploding current (50, 75, 100 amperes) and the type of bonds for carbon and magnesium was determined. To ob
Photonic Crystal Fiber (PCF) based on the Surface Plasmon Resonance (SPR) effect has been proposed to detect polluted water samples. The sensing characteristics are illustrated using the finite element method. The right hole of the right side of PCF core has been coated with chemically stable gold material to achieve the practical sensing approach. The performance parameter of the proposed sensor is investigated in terms of wavelength sensitivity, amplitude sensitivity, sensor resolution, and linearity of the resonant wavelength with the variation of refractive index of analyte. In the sensing range of 1.33 to 1.3624, maximum sensitivities of 1360.2 nm ∕ RIU and 184 RIU−1 are achieved with the high sensor resolutions of 7
... Show MoreAn optical video communication system is designed and constructed using pulse frequency modulation (PFM) technique. In this work PFM pulses are generated at the transmitter using voltage control oscillator (VCO) of width 50 ns for each pulse. Double frequency, equal width and narrow pulses are produced in the receiver be for demodulation. The use of the frequency doubling technique in such a system results in a narrow transmission bandwidth (25 ns) and high receiver sensitivity.
Polycystic ovary syndrome (PCOS) referring to a syndrome that is recognized as a life-course disease and has both metabolic and reproductive signs; main pathophysiological cause includes insulin resistance, hyperandrogenism, and oxidative stress state. The study aimed to assess the impact of combining Myoinositol and Metformin, the main insulin-sensitizing drugs, on improving clinical, metabolic, and hormonal parameters in females with PCOS. A clinical trial that was prospective, randomized, and comparative on 54 patients (aged 18-40 y) are divided into three groups: group1 patients allocated to receive Myo-inositol(4g), group2 patients assigned to receive Metformin(1g) and group3 patients assigned to receive Myo-inositol(4g) + Metformin
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper