Preferred Language
Articles
/
8Rf0opEBVTCNdQwCPZZQ
Electrical Discharges Characterization of Planar Sputtering System
...Show More Authors

Abstract: A home-made dc sputtering is characterized by cathode potential of 250-2500 V and sputtering gas pressures of (3.5×10-2 – 1.5) mbar. This paper studies in experiment the breakdown of argon, nitrogen, and oxygen in a uniform dc electric field at different discharge gaps and cathode potentials. Paschen curves for Argon, Nitrogen, and oxygen are obtained by measuring the breakdown voltage of gas within a stainless steel vacuum chamber with two planar, stainless steel electrodes. The Paschen curves in Ar, N2, and O2 gases show that the breakdown voltage between two electrodes is a function of pd (The product of the pressure inside the chamber and distance between the electrodes). Current-voltage characteristics visualization of the discharge indicate that the discharge is operating in the abnormal glow region.

Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 13 2020
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
Robust Approach of Optimal Control for DC Motor in Robotic Arm System using Matlab Environment
...Show More Authors

Modern automation robotics have replaced many human workers in industrial factories around the globe. The robotic arms are used for several manufacturing applications, and their responses required optimal control. In this paper, a robust approach of optimal position control for a DC motor in the robotic arm system is proposed. The general component of the automation system is first introduced. The mathematical model and the corresponding transfer functions of a DC motor in the robotic arm system are presented.  The investigations of using DC motor in the robotic arm system without controller lead to poor system performance. Therefore, the analysis and design of a Proportional plus Integration plus Divertive (PID) controller is illustrated.

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Iop Conference Series: Earth And Environmental Science
Effluent Quality Assessment Monitoring of Al-Rustamiya Sewage Treatment Plant Using Geographical Information System (GIS)
...Show More Authors
Abstract<p>Water quality assessment offers a scientific basis for water resource development and management. This research aims to assessment of Al-Rustamiya sewage treatment plant depending on annually changes and produces maps that declare changes on parameter during a period (2015-2018). Based on prior Government Department Baghdad Environment data which annually feature changes for samples from Northern Rustamiya have been estimated as a working model. Drawn a map of the Diyala River shows annual changes in the characteristics of the Diyala River, based on northern and southern Rustamiya effluent samples, and Diyala River samples. The characteristics that research focused on were biochemical</p> ... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
On Blow-up Solutions of A Parabolic System Coupled in Both Equations and Boundary Conditions
...Show More Authors

This paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.

View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Sat Nov 03 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Construction of an Initial Assessment Documentation Tool for Nursing Recording System in Coronary Care Units
...Show More Authors

Objective : The study was carried out to construct an initial assessment documentation tool for nursing
recording system in Coronary Care Unit.
Methodology : A descriptive, purposive sample of (65) nurses was selected from CCU of main
teaching hospitals (Al Karama, Al Kindy, Al Kadimia, Al Yarmmok, Baghdad teaching hospital, Ibn
Al Naffis hospital) and Ibn-Al betar hospital in Baghdad city from the 15th of April 2004 to the 15th of
April 2006.
The instrument was constructed and comprised of two sections: section one included the
nurses' demographic characteristic; section two was the initial assessment documentation tool that
contained (2) parts including: General information form and the initial assessment form.

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
Indian Journal Of Natural Sciences
The Numerical and Experimental Work of Chaos System in Three Dimensions Phase Spaceusing Rossler Circuit
...Show More Authors

In this paper, we deal with a dynamical system that can demonstrate a chaotic attractor of Rossleroscillator. We simulate the Rosslerequations numerically then we investigate the model experimentally. Numerically, the Rossler parameter a and b were fixed and c was changed.The evolution of the system exhibits period, period-doubling, second period doubling, and chaos when control parameters are changed. This evolution can be seen by analyze the time series, the bifurcation diagrams and phase space. Experimentally, the evolution of the system exhibited the same numerical behavior by changing the resistance (Rv) in Rossler circuit that represent as control parameter.

Publication Date
Mon Jun 01 2015
Journal Name
Conference: 8th International Conference And Exhibition On Design And Production Of Machines And Dies/molds
Design, Construction, and Controlling of A Shaped Metal Deposition Machine Using Arc Metal-Wire System
...Show More Authors

Publication Date
Tue Jan 01 2019
Journal Name
Cogent Engineering
IEC 60909 and ANSI standards comparison with ASCC based fault calculations of Iraqi power system
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 16 2024
Journal Name
Light & Engineering
The Design and Experimental Realization of a Laser-Based Heating System Using Recycled Laser Module
...Show More Authors

Laser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref