When employing shorter (sub picosecond) laser pulses, in ablation kinetics the features appear which can no longer be described in the context of the conventional thermal model. Meanwhile, the ablation of materials with the aid of ultra-short (sub picosecond) laser pulses is applied for micromechanical processing. Physical mechanisms and theoretical models of laser ablation are discussed. Typical associated phenomena are qualitatively regarded and methods for studying them quantitatively are considered. Calculated results relevant to ablation kinetics for a number of substances are presented and compared with experimental data. Ultra-short laser ablation with two-temperature model was quantitatively investigated. A two-temperature model for the description of transition phenomena in a non-equilibrium electron gas and a lattice under picosecond laser irradiation is proposed. Some characteristics are hard to measure directly at all. That is why the analysis of physical mechanisms involved in the ablation process by ultra-short laser pulses has to be performed on the basis of a theoretical consideration of `indirect' experimental data. For Copper and Nickel metal targets, the two-temperature model calculations explain that the temperature of the electron subsystem increased suddenly and approached a peak value at the end of laser pulse. In addition, the temperature profile of lattice temperature subsystem evolution slowly, and still increasing after the end of laser pulse. A good agreement prevails when a comparison between the present results and published results.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreBackground: Environmental chemicals are thought to
adversely affect human reproductive function.
Objective : To estimate the concentration of cadmium(Cd)
, lead ( Pb ) and Zinc ( Zn ) in serum and seminal plasma
among infertile men .
Methods: A sample of 70 infertile men was investigated.
The relationship of trace elements concentration in serum and
seminal plasma was studied in relation to sperm density,
motility and sperm count.
Results: Except for Zinc the concentration of (Pb) and (Cd)
were generally higher in serum than in seminal plasma. The
mean concentration of (Zn) in seminal plasma was more than
25 times higher than in serum There were no statistical
significant differences observed in the
This study aims to analyze the flow migration of individuals between Iraqi governorates using real anonymized data from Korek Telecom company in Iraq. The purpose of this analysis is to understand the connection structure and the attractiveness of these governorates through examining the flow migration and population densities. Hence, they are classified based on the human migration at a particular period. The mobile phone data of type Call Detailed Records (CDRs) have been observed, which fall in a 6-month period during COVID-19 in the year 2020-2021. So, according to the CDRs nature, the well-known spatiotemporal algorithms: the radiation model and the gravity model were applied to analyze these data, and they are turned out to be comp
... Show MoreExperimental research was carried out to investigate the performance of CFRP wrapping jackets used for retrofitting twelve square reinforced concrete (CR) column specimens damaged by exposure to fire flame, at different temperatures of 300, 500 and 700ºC, except for two specimens that were not burned. The specimens were then loaded axially till failure after gradual or sudden cooling. The specimens were divided into two groups containing two main reinforcement ratios, ρ= 0.0314 and ρ= 0.0542. This was followed by the retrofitting procedure that included wrapping all the specimens with two layers of CFRP fabric sheets. The test results of the retrofitted specimens showed that the fire damaged RC
... Show MoreThe aim of this work is to calculate the one- electron expectation value of the electronic charge of atomic system Z=2,3….7 and we compare with He atom . the electronic density function D(r1) of He atom and like ions are evaluated . using Hartree –Fock wave.
Abstract
In order to determine what type of photovoltaic solar module could best be used in a thermoelectric photovoltaic power generation. Changing in powers due to higher temperatures (25oC, 35oC, and 45oC) have been done for three types of solar modules: monocrystalline , polycrystalline, and copper indium gallium (di) selenide (CIGS). The Prova 200 solar panel analyzer is used for the professional testing of three solar modules at different ambient temperatures; 25oC, 35oC, and 45oC and solar radiation range 100-1000 W/m2. Copper indium gallium (di) selenide module has the lowest power drop (with the average percent
... Show MoreThe theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show MoreA modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify the va
... Show More