Preferred Language
Articles
/
bsj-1345
A proposed Mathematical Expression for Computer Design of Electrostatic Mirror
...Show More Authors

A computational investigation has been carried out on the design and properties of the electrostatic mirror. In this research, we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The electron beam path under zero magnification condition had been investigated as mirror trajectory with the aid of fourth – order – Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements, i.e. each optical element in optical system has suffer from the chromatic aberration, for this case, it is use to operate the mirror in optical system at various values of chromatic aberration to correct it in that system.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Mathematical treatment for solition-soliton interactions in mono-mode optical fiber
...Show More Authors

There are many images you need to large Khneh space With the continued evolution of storage technology for computers, there is a continuing need and are required to reduce Alkhoznip space Pictures Zguet pictures in a good way, the way conversion Alamueja to Purifiers

View Publication Preview PDF
Publication Date
Thu Dec 28 2023
Journal Name
Journal Européen Des Systèmes Automatisés
Design of a Hybrid Adaptive Controller for Series Elastic Actuators of Robots
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
Computer-assisted Programme for the Teaching of the English Syllable in RP Allophonic Pronunciation
...Show More Authors

Native speakers of English from different parts of the world have different accents,but the differences of accents are mainly the result of differences in the sound of  vowels  and consonants . The actual use of all these sounds in combination leads the speaker to produce a number of segments which only appear on the production level and realized on the perceptual  one . RP pronunciation represents the teachable variety in all Iraqi universities because it is the most acceptable and understandable accent all over the world and not only in South East London ..The structure of the English syllable in RP  pronunciation is influenced by the appearance of certain allophones especially aspiration and glottalization which ch

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Mathematical Modeling of a Hollow Fiber Module Used in Pressure-Retarded Osmosis Process
...Show More Authors

   Pressure retarded osmosis (PRO) can be considered as one of the methods for utilizing osmotic power, which is a membrane-based technology. Mathematical modeling plays an essential part in the development and optimization of PRO energy-generating systems. In this research, a mathematical model was developed for the hollow fiber module to predict the power density and the permeate water flux theoretically. Sodium chloride solution was employed as the feed and draw solution. Different operating parameters, draw solution concentration (1 and 2 M), the flow rate of draw solution (2, 3, and 4 L/min), and applied hydraulic pressure difference (0 - 90 bar) was used to evaluate the performance of PRO process of a hollow fiber module. The eff

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Proposed emerged and enhanced routing protocols for wireless networks
...Show More Authors

The problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Proposed Audit Program for Automated Clearing House System (ACH)
...Show More Authors

إن استخدام النظم الالكترونية في القطاع المصرفي وبالخصوص نظام مقاصة الصكوك الالكترونية (ACH) في عمليات التحويل الالكتروني للاموال بين المصارف تتضمن تحويلات مالية عالية القيمة  بين  المصارف المشاركة بهذا النظام, وان اي خلل قد يحدث بالنظام يؤدي الى حالات تلاعب في مقاصة الصكوك الالكترونية في المصارف المشاركة وبالتالي حدوث عملية اختلاس, ومن هذا المنطلق تبرز مشكلة البحث في اهمية توافر برنامج تدقيق مقترح ياخ

... Show More
View Publication
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Oct 02 2022
Journal Name
Al-manhaj
Mathematical Statistics - Second Edition
...Show More Authors

This Book is the second edition that intended to be textbook studied for undergraduate/ postgraduate course in mathematical statistics. In order to achieve the goals of the book, it is divided into the following chapters. Chapter One introduces events and probability review. Chapter Two devotes to random variables in their two types: discrete and continuous with definitions of probability mass function, probability density function and cumulative distribution function as well. Chapter Three discusses mathematical expectation with its special types such as: moments, moment generating function and other related topics. Chapter Four deals with some special discrete distributions: (Discrete Uniform, Bernoulli, Binomial, Poisson, Geometric, Neg

... Show More
Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A proposed encryption technique of different texts using circular link lists
...Show More Authors

View Publication
Scopus (5)
Scopus Crossref
Publication Date
Sun Apr 30 2017
Journal Name
Journal Of Engineering
Implementation of a Proposed Load-Shedding System Using Altera DE2 FPGA
...Show More Authors

A load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The

... Show More
View Publication Preview PDF