The project has been described the design and construction of a reliable optical testing platform used for evaluate the reflectivity of metal surfaces treated with special paintings required for laser beam attenuation. The platform comprises an Nd-YAG laser system which has been designed and fabricated with specifications to be compatible with their corresponding in laser range finder transmitters used for various applications. The reflectivity of various attenuating paintings, at different detection angles, has been observed. Moreover, the variation of the reflected energy with painting type and metal type to be painted has been studied experimentally. Results illustrated the existence of a definite angle, at which the reflectivity was maximum (specular reflection). On the other hand, samples with attenuation paintings have constant very low diffusive reflectivity and are independent of the detection angle.
The study showed significant differences between the average weight lens and the average amount protein in the lens between that Kestrel Falco tinnunculus L. and the Collared Dove Streptopelia decaocto F. , also the study electrical migration of lens proteins having one bundle of crystalline –? in Kestrel compared with three bundles in Collared Dove, two bundles of crystalline – ? in both , and crystalline – ? appeared as one bundle in both birds.
Challenges facing the transition of traditional cities to smart: Studying the challenges faced by the transition of a traditional area such as Al-Kadhimiya city center to the smart style
research objectives to:
1. identify the social, economic and cultural factors affecting consumption.
2. detect the consumption culture among the population in the city of Erbil.
3. Identify the GATT consumer protection and rights.
The most important results:
1. that there is variation in the answers of respondents about keep up with modernity in the basic consumption (necessary), it swallowed the proportion of yes answers about keep up with modernity in food consumption (72%), and is an indication of growing consumer awareness of the individual in the side of nutrition. The clothing on the side of the proportion of yes answers amounted to (85%), in the health field note that the percentage of yes answers (83%), who are abr
The current paper aims to identify potential factors associated with employees’ intentions to leave information and communication technology companies in Iraq. There is evident variability in the literature regarding these factors; hence, a factor analysis approach was employed to identify these factors within the surveyed environment. Due to the difficulty in precisely delineating the size of the research population, a purposive sampling method was employed to reach an appropriate number of respondents within the aforementioned companies. A total of 288 employees responded to the survey conducted via Google Forms. The test results revealed the presence of five primary factors associated with employees’ intentions to leave, name
... Show MoreThis study aims to show some of Imam Al-Bukhari's criticism of the Hadith from the Metn side, and part of his methodology in dealing with the correct hadiths that are tainted by a bug. This research focuses on what Imam Al-Bukhari summarized in his Sahih illusion of the narrator in his attribution, or uniqueness of the narrator, or to suggest a novel. We find that Bukhari sometimes abbreviates the hadeeth, and does not bring it out completely in his Sahih. He is satisfied with the abbreviated position but has done so because of a bug in it. The Bukhari usually does not declare his intention but knows this through tracking, inspection, and research of the correct hadiths.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More