In this paper , the CO2 laser receiver system is designed and studied, with wavelength laser 10.6 ?m in room temperature , and to evaluate the performance and discussion it via the package of optical design (ZEMAX), from its output the Spot Diagram is measured through RMS ,and from the Ray fan plot , the aberrations is found which is the normal error for the best focus named (under corrected ) , the other output was the Geometric Encircled Energy in the spot diagram . and found that the radius of spot diagram at 80% (R80%) from the total energy ,and focal shift .The designed system have high efficiency and low cost .
In the name of Allah, the Beneficent, the Merciful.
Praise be to Allah, Lord of the Worlds and peace and blessings on the honest and trustworthy (Muhammad) and his family and his divine good companions.
The Islamic clothing is one of the requirements of the common and original innateness to humans; the innateness that is created by God to all people, Allah says, (So set thou thy face steadily and truly to the Faith: [establish] Allah's handiwork according to the pattern on which He has made mankind: no change [let there be] in the work [wrought] by Allah: that is the standard Religion: but most among mankind understand not) (1). Islam as a natural religion has ordered the Muslims to wear decently, Allah says, ( O Children of Adam!
The study includes collection of data about cholera disease from six health centers from nine locations with 2500km2 and a population of 750000individual. The average of infection for six centers during the 2000-2003 was recorded. There were 3007 cases of diarrhea diagnosed as cholera caused by Vibrio cholerae. The percentage of male infection was 14. 7% while for female were 13. 2%. The percentage of infection for children (less than one year) was 6.1%, it while for the age (1-5 years) was 6.9%and for the ages more than 5 years was 14.5%.The total percentage of the patients stayed in hospital was 7.7%(4.2%for male and 3.4%for female). The bacteria was isolated and identified from 7cases in the Central Laboratory for Health in Baghdad. In
... Show MoreI came back and made my jewelery from the first research or studies known to man, and the oldest era and confirmed the problem of searching for the links of sweets and admiration of the magnificence of the effectiveness of the search for the importance of preserving the heritage of the Iraqi civilization in its original creative aspects. Metal in Iraq, Head Costume, Neck Costume, Party Costume (Hands and Legs). The main results of the research were;
1-Contemporary folk jewelry in Iraq was characterized by design units for use.
Dependence in the feed industry in the form of laboratory mold.
In many oil fields only the BHC logs (borehole compensated sonic tool) are available to provide interval transit time (Δtp), the reciprocal of compressional wave velocity VP.
To calculate the rock elastic or inelastic properties, to detect gas-bearing formations, the shear wave velocity VS is needed. Also VS is useful in fluid identification and matrix mineral identification.
Because of the lack of wells with shear wave velocity data, so many empirical models have been developed to predict the shear wave velocity from compressional wave velocity. Some are mathematical models others used the multiple regression method and neural network technique.
In this study a number of em
... Show MoreThe CIGS/CdS p-n junction thin films were fabricated and deposited at room temperature with rate of deposition 5, and 6 nm secG1 , on ITO glass substrates with 1mm thickness by thermal evaporation technique at high vacuum pressure 2×10G5 mbar, with area of 1 cm2 and Aluminum electrode as back contact. The thickness of absorber layer (CIGS) was 1 µm while the thickness of the window layer CdS film was 300 nm. The X-ray Diffraction results have shown that all thin films were polycrystalline with orientation of 112 and 211 for CIGS thin films and 111 for CdS films. The direct energy gaps for CIGS and CdS thin films were 1.85 and 2.4 eV, respectively. Atomic Force Microscopy measurement proves that both films CIGS and CdS films have nanostru
... Show MoreIn our work present, the application of strong-Lensing observations for some gravitational lenses have been adopted to study the geometry of the universe and to explain the physics and the size of the quasars. The first procedure was to study the geometrical of the Lensing system to determine the relation between the redshift of the gravitational observations with its distances. The second procedure was to compare between the angular diameter distances "DA" calculated from the Euclidean case with that from the Freedman models, then evaluating the diameter of the system lens. The results concluded that the phenomena are restricted to the ratio of distance between lens and source with the diameter of the lens noticing.
Alzheimer’s disease (AD) is an age-related progressive and neurodegenerative disorder, which is characterized by loss of memory and cognitive decline. It is the main cause of disability among older people. The rapid increase in the number of people living with AD and other forms of dementia due to the aging population represents a major challenge to health and social care systems worldwide. Degeneration of brain cells due to AD starts many years before the clinical manifestations become clear. Early diagnosis of AD will contribute to the development of effective treatments that could slow, stop, or prevent significant cognitive decline. Consequently, early diagnosis of AD may also be valuable in detecting patients with dementia who have n
... Show MoreBlogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show More
