A computational investigation has been carried out on the design and properties of the electrostatic mirror. In this research, we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The electron beam path under zero magnification condition had been investigated as mirror trajectory with the aid of fourth – order – Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements, i.e. each optical element in optical system has suffer from the chromatic aberration, for this case, it is use to operate the mirror in optical system at various values of chromatic aberration to correct it in that system.
Theoretical study computerized has been carried out in electron optics field, to design electrostatic immersion lens , the inverse problem is important method in the design of electrostatic lenses by suggesting an axial electrostatic potential distribution using polynomial function. The paraxial –ray equation is solved to obtain the trajectory particles that satisfy the suggested potential function. In this research, designed immersed lens length L = 10mm operated under zero condition, as it was obtained the electrode shape of this lens solutions using the Laplace equation The results of the search showed low values of spherical and chromatic aberrations, which gives a good indication of the design of the lens. It was
... Show MoreThe aim of this study is to design a proposed model for a document to insure the mistakes of the medical profession in estimating the compensation for medical errors. The medical profession is an honest profession aimed primarily at serving human and human beings. In this case, the doctor may be subject to error and error , And the research has adopted the descriptive approach and the research reached several conclusions, the most prominent of which is no one to bear the responsibility of medical error, although the responsibility shared and the doctor contributes to them, doctors do not deal with patients according to their educational level and cultural and there are some doctors do not inform patients The absence of a document to insu
... Show MoreThis research aims to know the effectiveness of teaching with a proposed strategy according to the common Knowledge construction modelin mathematical proficiency among students of the second middle class. The researchers adopted the method of the experimental approach, as the experimental design was used for two independent and equal groups with a post-test. The experiment was applied to a sample consisting of (83) students divided into two groups: an experimental comprising (42) students and a control group, the second comprising (41) students., from Badr Shaker Al-Sayyab Intermediate School for Boys, for the first semester of the academic year (2021-2022), the two groups were rewarded in four variables: (chronological age calculated in mo
... Show MoreMany cinematic adaptations were produced for the Grimms’ “Little Snow-White” (1812) including Mirror Mirror movie (2012), the contemporary version adapted by Taresm Singh. Singh’s version was able to depict the modern reality of women and went against patriarchy by embracing feminist ideologies of the fourth-wave feminism. Therefore, he challenged the ideologies of the mainstream cinema dominated by the patriarchal élite’s capitalist mode of production that still adhere to the stereotyped patriarchal image of women’s ‘victimization,’ ‘objectification’ and ‘marginalization,’ which did not represent women’s modern reality anymore. This paper, however, is a qualitative study aimed to prove that the femini
... Show MoreSegmentation is one of the most computer vision processes importance, it aims to understand the image contents by partitioning it into segments that are more meaningful and easier to analyze. However, this process comes with a set of challenges including image skew, noise, and object clipping. In this paper, a solution is proposed to address the challenges encountered when using Optical Character Recognition to recognize mathematical expressions. The proposed method involves three stages: pre-processing, segmentation, and post-processing. During pre-processing, the mathematical expression image is transformed into a binary image, noise reduction techniques are applied, image component discontinuities are resolved, and skew corre
... Show MoreTheoretical study computerized has been carried out in field electron optics , to design electrostatic unipotential lens , the inverse problem is important method in the design of electrostatic lenses by suggesting an axial electrostatic potential distribution using polynomial function. The paraxial –ray equation is solved to obtain the trajectory particles that satisfy the suggested potential function. In this research , design electrostatic unipotential lens three-electrode accelerating and decelerating L=5 mm operated under finite and infinite magnification conditions. The electrode shape of the electrostatic lens was then determined from the solution of the Laplace's equation's. the results showed low values of spherica
... Show MoreIn this paper, design computationl investigation in the field of charged-particle optics with the aid of numerical analysis methods under the absence of space charge effects. The work has been concentrated on the design of three-electrode einzel electrostatic lens accelerating and decelerating operated under different magnification conditions. The potential field distribution of lens has been represented by exponential function. The paraxial-ray equation has been solved for the proposed field to determine the trajectory of charged-particles traversing in the lens. From The axial potential distribution and its first and second derivatives, the optical propertie
... Show MoreSteganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography
Congenital hand and forearm anomalies pose a unique challenge in plastic and pediatric surgery. We present a case report of an 8- months-old girl with a congenital left sided hand and forearm anomaly, provisionally diagnosed as atypical left mirror hand anomaly. Classically there is absence of radius and duplication of ulna; however, our case had normal radius and ulna and a hand with seven digits arranged in two groups. We did a surgery which involved a ray amputation of the finger ulnar to the most radial digit, aiming to preserve an adequate first web space to reconstruct the thumb. The result of the surgical treatment in both functional and cosmetic aspects was, in authors’ opinion, good.