In this work, we are obviously interested in a general solution for the calculation of the image of a single bar in partially coherent illumination. The solution is based on the theory of Hopkins for the formation of images in optical instruments in which it was shown that for all practical cases, the illumination of the object may be considered as due to a self – luminous source placed at the exit pupil of the condenser , and the diffraction integral describing the intensity distribution in the image of a single bar – as an object with half – width (U0 = 8 ) and circular aperture geometry is viewed , which by suitable choice of the coherence parameters (S=0.25,1.0.4.0) can be fitted to the observed distribution in various types of microscope , the aberration were restricted to defocusing and coma upto third – order , the method of integration was Gauss quadrature: The necessary set of integration depends , of course , on the amount of present aberrations and had to be chosen (20) points of Gauss which decrease the computation time to few seconds: The aberration free systems corresponding to the paraxial receiving plane (W20= 0.0) is especially interesting as it predicts diffraction pattern shape. The influence of defocusing is very pronounced and relatively distorts the object , the influence of the off – axis aberration (third – order coma ), in which it was shown that for the high peaks in the images are most noticeable in the region of almost perfect coherence (S=0.25). As (S) is increased from (0.25) to (1.0) there is a pronounced redistribution of intensity, with peaks moving from one side of the image to the other. Calculations were also performed for systems having spherical aberration, but the results are qualitatively similar to an aberration – free defocused system and are omitted, so we will not present any numerical results. A computer program was written in FORTRAN 77 which solved the modified intensity distribution of Hopkins for(U´) dimensionless distance. The advantage of that additional work on this class of problems to investigate the development of more efficient numerical methods, also the reduction in computation time to few seconds for data runs for individual curves of intensity.
Flexible pavements are subjected to three main distress types: fatigue crack, thermal crack, and permanent deformation. Under severe climate conditions, thermal cracking particularly contributes largely to a considerable scale of premature deterioration of pavement infrastructure worldwide. This challenge is especially relevant for Europe, as weather conditions vary significantly throughout the year. Hydrated lime (HL) has been recognized as an effective additive to improve the mechanical properties of asphalt concrete for pavement applications. Previous research has found that a replacement of conventional limestone dust filler using hydrated lime at 2.5% of the total weight of aggregates generated an optimum improvement in the mec
... Show MoreThe study aimed to prepare rehabilitation exercises using some rubber ropes for people with partial rupture of the anterior cruciate ligament, to recognize their effect on the recovery of motor tides and to reduce the pain of those with partial rupture of the anterior cruciate ligament of the knee joint, and adopted the experimental method by designing the experimental and controlled groups on a sample of those with partial rupture of the anterior cruciate ligament of men (30-35) One year of those who attend the Physiotherapy Center/Rafidain University College of 12 injured were deliberately selected from their community of origin by (100%), and after determining the measuring tools and preparation of exercises applied with rubber r
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreIn this paper, preliminary test Shrinkage estimator have been considered for estimating the shape parameter α of pareto distribution when the scale parameter equal to the smallest loss and when a prior estimate α0 of α is available as initial value from the past experiences or from quaintance cases. The proposed estimator is shown to have a smaller mean squared error in a region around α0 when comparison with usual and existing estimators.
Roller compacted concrete (RCC) is a concrete compacted by roller compaction. The concrete mixture in its unhardened state must support a roller while being compacted. The aim of this research work was to investigate the behavior and properties of roller compacted concrete when constructed in the laboratory using roller compactor manufactured in local market to simulate the field conditions. The roller compaction was conducts in three stages; each stage has different loading and number of passes of the roller. For the first stage, a load of (24) kg and (5) passes in each direction had been employed. For the second stage, a load of (104) kg and (10) passes in each direction were conducted. Finally, at the third stage, a load of (183) kg a
... Show MoreThe problem of research was to identify after the use of cost technology based on specifications in the validity of determining and measuring the costs of the implementation of contracting, by applying to al-Mansour General Construction Contracting Company as an appropriate alternative to the traditional costing system currently adopted, which is characterized by many shortcomings and weaknesses Which has been reflected in the validity and integrity of the calculations. To solve this problem, the research was based on the premise that: (The application of cost technology based on specifications will result in calculating the cost of the product according to the specification required by the customer, to meet his wishes properly and witho
... Show MoreIron , Cobalt , and Nickel powders with different particle sizes were subjected to sieving and He-Ne laser system to determine the particle size . 1wt% from each powders was blended carefully with 99wt% from Iraqi oil . Microscopic examination were carried for all samples to reveal the particle size distribution . A Siemens type SRS sequential wavelength dispersive(WDS) X-ray spectrometer was used to analyze all samples , and the XRF intensity were determined experimentally and theoretically for all suspended samples , Good agreement between theoretical and experimental results were found .
In this paper, a discussion of the principles of stereoscopy is presented, and the phases
of 3D image production of which is based on the Waterfall model. Also, the results are based
on one of the 3D technology which is Anaglyph and it's known to be of two colors (red and
cyan).
A 3D anaglyph image and visualization technologies will appear as a threedimensional
by using a classes (red/cyan) as considered part of other technologies used and
implemented for production of 3D videos (movies). And by using model to produce a
software to process anaglyph video, comes very important; for that, our proposed work is
implemented an anaglyph in Waterfall model to produced a 3D image which extracted from a
video.
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreThe searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s
... Show More