In this work, we are obviously interested in a general solution for the calculation of the image of a single bar in partially coherent illumination. The solution is based on the theory of Hopkins for the formation of images in optical instruments in which it was shown that for all practical cases, the illumination of the object may be considered as due to a self – luminous source placed at the exit pupil of the condenser , and the diffraction integral describing the intensity distribution in the image of a single bar – as an object with half – width (U0 = 8 ) and circular aperture geometry is viewed , which by suitable choice of the coherence parameters (S=0.25,1.0.4.0) can be fitted to the observed distribution in various types of microscope , the aberration were restricted to defocusing and coma upto third – order , the method of integration was Gauss quadrature: The necessary set of integration depends , of course , on the amount of present aberrations and had to be chosen (20) points of Gauss which decrease the computation time to few seconds: The aberration free systems corresponding to the paraxial receiving plane (W20= 0.0) is especially interesting as it predicts diffraction pattern shape. The influence of defocusing is very pronounced and relatively distorts the object , the influence of the off – axis aberration (third – order coma ), in which it was shown that for the high peaks in the images are most noticeable in the region of almost perfect coherence (S=0.25). As (S) is increased from (0.25) to (1.0) there is a pronounced redistribution of intensity, with peaks moving from one side of the image to the other. Calculations were also performed for systems having spherical aberration, but the results are qualitatively similar to an aberration – free defocused system and are omitted, so we will not present any numerical results. A computer program was written in FORTRAN 77 which solved the modified intensity distribution of Hopkins for(U´) dimensionless distance. The advantage of that additional work on this class of problems to investigate the development of more efficient numerical methods, also the reduction in computation time to few seconds for data runs for individual curves of intensity.
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreRecent years have witnessed an increase in the use of composite coatings for numerous applications, including aerospace, aircraft, and maritime vessels. These materials owe this popularity surge to the superior strength, weight, stiffness, and electrical insulation they exhibit over conventional substances, such as metals. The growing demand for such materials is accompanied by the inevitable need for fast, accurate, and affordable nondestructive testing techniques to reveal any possible defects within the coatings or any defects under coating. However, typical nondestructive testing (NDT) techniques such as ultrasonic testing (UT), infrared thermography (IRT), eddy current testing (ECT), and laser shearography (LS) have failed to p
... Show More2929-2933
IMPLICATION OF GEOMECHANICAL EVALUATION ON TIGHT RESERVOIR DEVELOPMENT / SADI RESERVOIR HALFAYA OIL FIELD
Infection with cryptosporidiosis endangers the lives of many people with immunodeficiency, especially HIV patients. Nitazoxanide is one of the main therapeutic drugs used to treat cryptosporidiosis. However, it is poorly soluble in water, which restricts its usefulness and efficacy in immunocompromised patients. Surfactants have an amphiphilic character which indicates their ability to improve the water solubility of the hydrophobic drugs. Our research concerns the synthesis of new cationic Gemini surfactants that have the ability to improve the solubility of the drug Nanazoxide. So, we synthesized cationic Gemini surfactants. N1,N1,N3,N3-tetramethyl-N1,N3-bis(2-octadecanamidoethyl)propane-1,3-diaminium bromide (CGSPS18) and 2,2‘-(etha
... Show More