The aim of this research is to design and construct a semiconductor laser range finder
operating in the near infrared range for ranging and designation. The main part of the range finder is the
transmitter which is a semiconductor laser type GaAs of 0.904 mm wavelength with a beam expander,
and the receiver with its collecting optics. The characteristics of transmitter pulse width were 200ns and
threshold current 10 Amp. and maximum operating current 38 Amp. The repetition rate was set at 660 Hz
and maximum output power about 1 watt. The divergence of the beam was 0.268o. A special computer
code was used for optimum optical design and laser spot size analysis and for calculation of atmosphere
attenuation.
The current research studies the innovative thinking system in the field of the interior design, and the extent of the possibility of activating its work mechanisms as a strategy for the redesigning principle according the variables of the contemporary social thinking. The research aims at revealing the nature of the thinking criteria and requirements that provide strategic values that guide the interior designer and the architect to organize the mechanism the act of designing. It also contributes in dealing with the design product through activating its ability in innovation and redesigning.
The research consists of the concept of innovation, the&nbs
... Show MoreTo improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading
... Show MoreThe Ilkhanid Mongols (651-756 AH / 1253-1355 AD) were interested in urbanization and construction in keeping with civilized countries and to have an architectural imprint that competed with the neighboring nations. The Ilkhan Öljeitü Muḥammad Khudābandeh (703-716 AH / 1303-1316 AD), known for his love of building and construction, wanted to have a capital that would immortalize his name and history, so he ordered its construction to compete with contemporary cities, and he summoned workers and engineers from all over the world to contribute to its construction. The city has several educational and service institutions such as schools, ribats, khanqas, mosques, hospitals, markets, and baths, as well as a mausoleum for him, which
... Show MoreThe design of fabrics and fashion is manifested by aesthetic advantages betting with the movement of society in its quest to develop as an independent art in itself that is linked to the values and aesthetic concepts of other arts and what appears in them of intellectual systems calling for renewal and modernity. Which brought about a wide change in public taste, as well as a desire for innovation . Which made fashion an interesting aesthetic phenomenon and taste is always subject to change constantly to comply with the social variables that occur in human life, as the fashion that appears in a certain era of time and takes a great distance from spreading as something new and out of the ordinary is in fact the fruit of the development of
... Show MoreIn this work, we construct the projectively distinct (k, n)-arcs in PG (3, 4) over Galois field GF (4), where k 5, and we found that the complete (k, n)-arcs, where 3 n 21, moreover we prove geometrically that the maximum complete (k, n)-arc in PG (3, 4) is (85, 21)-arc. A (k, n)-arcs is a set of k points no n+ 1 of which are collinear. A (k, n)-arcs is complete if it is not contained in a (k+ 1, n)-arcs
The present paper aims at investigating the linguistic image portrayed by UNICEF reports on the Iraqi child from a critical discourse analysis perspective during Covid19 pandemic (2020). The paper attempts to fill a gap in research literature concerning the linguistic construction of the Iraqi child by the UNICEF reports during the critical health crisis of Covid19. Van Leeuwen’s (2008) approach of social actor representation has been adopted for this purpose. From Van Leeuwen’s approach, the category of determination (single determination and overdetermination) has been selected to be the main analytical tool for its high compatibility with the set of objectives put forward to figure out how such a globally effective and
... Show MoreThis research aims to explore the impact of strategic intelligence by his dimensions (Foresight , system thinking, vision, motivation and partnership) on decision making styles which represented by ( rational, intuitive, dependent, Spontaneous and Avoidant style) for a sample of the administrative leaders in the center of Reconstruction &Housing Ministry and Some its formations which are companies of (Sa'ad, Al Mansour, al Farouq, Assyria, al-Mu'tasim, al- Rasheed, and Public Authority for Housing). So to achieve the research objectives and to test hypotheses, it has been relying
... Show MoreConstructal theory plays a major role in the conceptual design stage of the structural system in architecture. It provides a conceptual framework for predicting the form depending on natural systems to model those systems geometrically according to the constructal law that works in two directions: the first is towards predicting the general form of the structural system, and the second is the physical application of the law in the process of detailed design of the parts of the system. The aim of this paper is to determine the mechanism adopted in the structural design according to the constructal theory, assuming that the structural design according to the constructal theory achieves
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.