A simulated ion/electron optical transport and focusing system has been put forward to
be mounted on high voltage transmission electron microscope for in situ investigations.
The suggested system consists of three axially symmetric electrostatic lenses namely an
einzel lens, an accelerating immersion lens, and a decelerating immersion lens, in addition
to an electrostatic quadrupole doublet lens placed on the image side. The electrodes
profile of these lenses is determined from the proposed axial field distributions. The
optical properties of the whole system have been computed together with the trajectory of
the accelerated charged-particles beam along the optical axis of the system. The computed
dimensions of the final image have been found to be electron-optically acceptable
The study aims to clarify the truth of hearing the dead, and then the statement of the legitimate judgment of the indoctrination, by reference to the evidence contained in that regard, and try to combine and reconcile those evidence, and the study finds that the most correct in the matter of hearing is to say hearing the dead in the will of God and how Almighty teaches , As up to that indoctrination of the dead is permissible, so as to combine evidence.
Background: The accuracy of fitness of any dental casting is imperative for the success of any prosthodontic treatment. From the time that dental casting was first introduced, efforts have been made to produce more accurate and better fitted castings with minimal marginal discrepancy. The aim of this in vitro study was to evaluate the effects of three different investing and burnout techniques on the vertical marginal discrepancies ofceramometalcopings invested with two types of phosphate- bonded investments. Materials and methods: Sixty wax patterns were fabricated on a standardized prepared brass die representing an upper central incisor by the aid of a custom-made split mold. Three different investing and burnout techniques were applied
... Show MoreCadmium oxide (CdO) thin films were deposited using the sequencing ion layer adsorption and reaction (SILAR) method. In this study, the effect of the pH value of an aqueous solution of cadmium acetate at a concentration of 0.2 mol of the cadmium oxide film was determined. The solution source for the cadmium oxide film was cadmium ions and an aqueous ammonia solution. The CdO films were deposited on glass substrates at a temperature of 90 ℃. The cadmium oxide film thickness was determined by the weight difference method at pH values (7.2, 8.2). X-ray diffraction (XRD) and scanning electron microscopy (SEM) showed that the size of the crystals increased with the increase in the solution (pH). While the UV-visible spectra of the fil
... Show MoreIn this work, InSe thin films were deposited on glass substrates by thermal evaporation technique with a deposit rate of (2.5∓0.2) nm/sec. The thickness of the films was around (300∓10) nm, and the thin films were annealed at (100, 200 and 300)°C. The structural, morphology, and optical properties of Indium selenide thin films were studied using X-ray diffraction, Scanning Electron Microscope and UV–Visible spectrometry respectively. X-ray diffraction analyses showed that the as deposited thin films have amorphous structures. At annealing temperature of 100°C and 200°C, the films show enhanced crystalline nature, but at 300°C the film shows a polycrystalline structure with Rhombohedral phas
This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreIn this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show More