In this research , design and study a (beam expander) for the Nd – YAG laser with (1.06 ?m) Wavelength has been studied at 5X zoom with narrow diversion in the room temperature. by using (ZEMAX) to study the system. Evaluate its performance via (ZEMAX) outputs, as bright Spot Diagram via (RMS), Ray Fan Plot, Geometric Encircled Energy and the value of Focal shift. Then study the effect of field of view on the outputs in the room temperature.
The continuous pressure of work and daily life and the increasing financial and social stress that Iraqi women are experiencing (both inside and outside Iraq) is one of the main causes of anxiety, particularly in those of working class women. This group of women carry the burden of carrying out multiple roles and responsibilities at the same time. All this collectively make them more prone to developing anxiety compared to men. In addition, the physiological and psychological nature of women, as females, on top of the other roles in life, like being a wife or mother or daughter or sister, all add extra pressure on women especially for those who are considered as productive working individuals in the society. In order to study the relatio
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreVerbs are an important material in the construction of the sentence, as they are among the requirements of every sophisticated language, and in this regard, Ibn Al-Gothic (d. 367 AH): “Know that verbs are the origins of the buildings of most speech, and thus scholars called them buildings.” Verbs are the source of expression of the speakers’ ideas to represent the element of activity and movement, and with their knowledge We infer the meanings of Arabic words, and Ibn Al-Sarraj (d. 316 AH) defined it: “The verb denotes a meaning and a time, and that time is either past, present, or future.” Its letters are original and does not drop from its construction a letter in the conjugation of its conjugations, and it is in Arabic two type
... Show MoreCR-39 is a solid state nuclear track detector (SSNTD) that has been used in many research areas. In spite of the assumption that the CR-39 detectors are insensitive to beta and gamma rays, irradiation with these rays can have significant effects on the detector properties. In this study, beta and gamma rays mass attenuation coefficients μ/ρ (cm2 g-1) for the CR-39 detector have been measured using NaI(Tl) scintillation spectrometer along with a standard geometrical arrangement in the energy region of (0.546-2.274) MeV beta rays and standard gamma sources having energy 0.356, 0.5697, 0.6617 and 1.063 MeV. The total atomic cross-section (σtot), total electronic cross-section (σT E) and the effective atomic number (Zeff) of gamma rays a
... Show MoreAfter baking the flour, azodicarbonamide, an approved food additive, can be converted into carcinogenic semicarbazide hydrochloride (SEM) and biurea in flour products. Thus, determine SEM in commercial bread products is become mandatory and need to be performed. Therefore, two accurate, precision, simple and economics colorimetric methods have been developed for the visual detection and quantitative determination of SEM in commercial flour products. The 1st method is based on the formation of a blue-coloured product with λmax at 690 nm as a result of a reaction between the SEM and potassium ferrocyanide in an acidic medium (pH 6.0). In the 2nd method, a brownish-green colored product is formed due to the reaction between the SEM and phosph
... Show MoreAbstract. In this scientific work, we investigate the problem of the practical necessity of achieving the adequacy of translation activities with active translation from Russian into Arabic in various fields of translation. Based on the material of the latest suffix vocabulary, a serious attempt is made to clarify and specify the rules for the development of translator's intuition when translating from Russian into Arabic and vice versa. Based on the material collected by the latest suffix vocabulary, we try to make an attempt to reveal the role of suffix word creation in highlighting the general rules for achieving translation equivalence. The paper examines the process of creating words in multi-family languages, the difference between th
... Show MoreAbstract
The decision maker needs to understand the strategic environment to be addressed through different means and methods. It is obvious that there is a difference between the three strategic environments (conflict environment, peace environment, post- peace environment) in terms of inputs and strategies to deal with each one of them. There is an urgent need to understand each pattern separately, analyze its inputs, and identify the factors and variables that affect the continuity of this situation (conflict, peace, post-peace). It is not appropriate to identify treatment without diagnosis of the condition, so it is very important to understand the type of strategic environment to be dealt with it.
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show More