In this work a Nd:YVO4 thin disc laser setup is designed and fabricated. The disk laser system
is designed to be compact. The laser crystal was pumped by a 808 nm diode laser. The effect of input
current and pulse frequency on the output energy at pulse operation mode, and the effect of the input
current on the output power at CW mode operation are tested. At the pulsed mode, the output energy
increased linearly with the input current and decreased with pulse frequency. The threshold current
increased with increasing pulse frequency increasing. The maximum output energy from the thin disc
laser was 0.98 μJ at 1.3 kHz frequency, with 0.49A. A minimum threshold current for CW mode of
operation. The maximum output power from the disc laser was 22 mW.
Rotating fan shaft system was investigated experimentally and theoretically to study its dynamic performance. The type of oil used for the bearing was taken in consideration during the experimental program .Three types of oil were used, SAE 40, SAE 50 and degraded oil. During the experiments, the fan blades stagger angle was changed through angles (20˚, 30˚, 40˚, and 50˚). The shaft rotational speed also changed in the range of (0-3000 rpm). All these parameters have investigated for two cases (balanced and unbalanced fan). The performance parameters of the fan were found experimentally by measuring the fan, volume flow rate, Reynolds and Strouhal numbers, efficiency and pressure head. Analytical part was also represented to prepare
... Show MoreConclusion The observation of the phenomenon of structural evolution of the international system and its instability on a particular situation, by its transition from unipolar to polarity to bipolarism and then to unilateralism in the early 1990s led by the United States, and to the present moment, To say that the structure by which the hierarchy of superpowers or the regime is directed in terms of its various capacities that qualify it, and with the consent of the rest of the States directing the regime to lead and lead the world's first place, has no direct relation to the stability of this system, I hope other more influential in its stability. The structure of the new international order will be completely different in terms of the r
... Show Moreالنظام السياسي في كوريا الشمالة
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated visualization
... Show MoreIn this paper, the bowtie method was utilized by a multidisciplinary team in the Federal Board of Supreme Audit (FBSA)for the purpose of managing corruption risks threatening the Iraqi construction sector. Corruption in Iraq is a widespread phenomenon that threatens to degrade society and halt the wheel of economic development, so it must be reduced through appropriate strategies. A total of eleven corruption risks have been identified by the involved parties in corruption and were analyzed by using probability and impact matrix and their priority has been ranked. Bowtie analysis was conducted on four factors with high score risk in causing corruption in the planning stage. The number and effectiveness of the existing proactive meas
... Show MoreThe present paper aims at investigating the linguistic image portrayed by UNICEF reports on the Iraqi child from a critical discourse analysis perspective during Covid19 pandemic (2020). The paper attempts to fill a gap in research literature concerning the linguistic construction of the Iraqi child by the UNICEF reports during the critical health crisis of Covid19. Van Leeuwen’s (2008) approach of social actor representation has been adopted for this purpose. From Van Leeuwen’s approach, the category of determination (single determination and overdetermination) has been selected to be the main analytical tool for its high compatibility with the set of objectives put forward to figure out how such a globally effective and
... Show MoreThis research is under the title (Construction Grammar in the Kurdish language), which in turn is an attempt to present grammar and Kurdish grammar from the perspective of the constructive of Cognitive Linguistics. The construction as a term in the Kurdish language base was not recent, as it was discussed in other schools in a specific way from the perspective of language schools, but the subject of construction with a perceived background includes specific purposes, which is how to build the linguistic base by being a template accessible to its speakers, and in the cases of speaking it, not to mention how it is perceived and the level it is familiar with by its speakers. The nominal purpose of the Construction is Unification of form-mea
... Show MoreIn this work, we construct the projectively distinct (k, n)-arcs in PG (3, 4) over Galois field GF (4), where k 5, and we found that the complete (k, n)-arcs, where 3 n 21, moreover we prove geometrically that the maximum complete (k, n)-arc in PG (3, 4) is (85, 21)-arc. A (k, n)-arcs is a set of k points no n+ 1 of which are collinear. A (k, n)-arcs is complete if it is not contained in a (k+ 1, n)-arcs