Laser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable
Abstract
A two electrode immersion electrostatic lens used in the design
of an electron gun, with small aberration, has been designed using
the finite element method (FEM). By choosing the appropriate
geometrical shape of there electrodes the potential V(r,z) and the
axial potential distribution have been computed using the FEM to
solve Laplace's equation.
The trajectory of the electron beam and the optical properties of
this lens combination of electrodes have been computed under
different magnification conditions (Zero and infinite magnification
conditions) from studying the properties of the designed electron
gun can be supplied with Abeam current of 5.7*10-6 A , electron
gun with half acceptance
The finishing operation of the electrochemical finishing technology (ECF) for tube of steel was investigated In this study. Experimental procedures included qualitative
and quantitative analyses for surface roughness and material removal. Qualitative analyses utilized finishing optimization of a specific specimen in various design and operating conditions; value of gap from 0.2 to 10mm, flow rate of electrolytes from 5 to 15liter/min, finishing time from 1 to 4min and the applied voltage from 6 to 12v, to find out the value of surface roughness and material removal at each electrochemical state. From the measured material removal for each process state was used to verify the relationship with finishing time of work piece. Electrochemi
The corrosion inhibiting properties of the new furan derivative 5-(furan-2-ylmethylsulfonyl-4-phenyl-2,4- dihydro [1,2,4] triazole-3-thione in acidic solution (1.0 M HCl) were explored utilizing electrochemical, surface morphology (AFM), and quantum chemical calculations approaches. The novel furan derivative 5-(furan-2-ylmethylsulfonyl-4-phenyl-2,4- dihydro [1,2,4] triazole-3-thione shows with an inhibitory efficiency value of 99.4 percent at 150 ppm, carbon steel corrosion in acidic medium is effectively inhibited, according to the results. The influence of temperature on corrosion prevention was studied using adsorption parameters and activation thermodynamics. The novel furan derivative creates a protective layer over the metallic surfa
... Show MoreThe Financial systems can be classified into two types. The first is the market–oriented, which is applied in United States and United Kingdom. While the second is bank-oriented as in Japan and Germany.
This study tries to explain the reasons which make some countries adopt the first one instead of the second, and the contrary. So the study consists of three sections. The first deals with the concept of financial system and it are functions. The second displays the indicators which are used to classify the financial systems, while the third one is devoted to the factors that determine the type of financial system .These sections followed by some conclusions.
Renewable energy resources have become a promissory alternative to overcome the problems related to atmospheric pollution and limited sources of fossil fuel energy. The technologies in the field of renewable energy are used also to improve the ventilation and cooling in buildings by using the solar chimney and heat exchanger. This study addresses the design, construction and testing of a cooling system by using the above two techniques. The aim was to study the effects of weather conditions on the efficiency of this system which was installed in Baghdad for April and May 2020. The common weather in these months is hot in Baghdad. The test room of the design which has a size of 1 m3 was situated to face the geographical south. The te
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More
The Mesopotamian soil is muddy and fertile, and so from ancient eras Iraqis used mud in their building, settlements and architecture in different methodologies according to the nature and the function of the building that was either in its pure form or by mixing it with other materials such as straw . also as raw bricks in different ways either for the whale building or parts of it, or for the finishing parts such as roofing for instance. In this research these different forms and methodologies will permeate through out a chosen examples of historical building, rural buildings and settlements and ancient buildings as well as some current uses of mud in the structures and building in standing cities, this in order to conclude some
... Show MoreA computational investigation has been carried out on the design and properties of the electrostatic mirror. In this research, we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The electron beam path under zero magnification condition had been investigated as mirror trajectory with the aid of fourth – order – Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements, i.e. each optical element in optical system has suffer from the chromatic aberration, for this case, it is use to operate the mirror in optical system at various values
... Show More