A computational investigation has been carried out on the design and properties of the electrostatic mirror. In this research, we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The electron beam path under zero magnification condition had been investigated as mirror trajectory with the aid of fourth – order – Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements, i.e. each optical element in optical system has suffer from the chromatic aberration, for this case, it is use to operate the mirror in optical system at various values of chromatic aberration to correct it in that system.
Polymeric hollow fiber membrane is produced by a physical process called wet or dry/wet phase inversion; a technique includes many steps and depends on different factors (starting from selecting materials, end with post-treatment of hollow fiber membrane locally manufactured). This review highlights the most significant factors that affect and control the characterization and structure of ultrafiltration hollow fiber membranes used in different applications.
Three different types of polymers (polysulfone PSF, polyethersulfone PES or polyvinyl chloride PVC) were considered to study morphology change and structure of hollow fiber membranes in this review. These hollow fiber membranes were manufactured with different pro
... Show MoreThis study was conducted to investigate phytoplasma causing a virescence disease on Arabic jasmine Jasminum sambac based on microscopy and molecular approaches. Samples were collected from symptomatic Arabic jasmine plants grown in nurseries in Baghdad-Iraq. Specimens from infected plants were prepared and Dienes stained for light microscopy examination. Phytoplasma were detected in infected plants by polymerase chain reaction (PCR) using P1/P7 and SecAfor1/SecArev3 Candidatus Phytoplasma specific primer sets. Light microscopy test showed symptomatic Arabic jasmine plants were phytoplasms infected when phloem tissues were stained with a dark blue color. PCR test confirmed the symptomatic plants were phytoplasms infected when SecAfor1/Sec
... Show MoreMuseum education is of great importance to an appropriate representation of museums’ collections and exhibits, including traditional fashion. Therefore, museum educators/curators need to be equipped with the most essential skills in their profession in order to adequately present the museum’s history and holdings. This could be achieved through specialized training programs. However, Arab countries are still behind in terms of museum education. Therefore, this article aims to shed light on this issue by assessing the knowledge and skills possessed by museum educators/curators and how training programs could affect them
Background: The pandemic crisis prompted the world to adopt unexpected approaches to continue life as normally as possible. The education sector, including professors, students, and the overall teaching system, has been particularly affected. Objective: This study seeks to evaluate the benefits, challenges, and strategies related to COVID-19 from the perspectives of college students, particularly those in higher education in Iraq. Method: The online survey questionnaire was distributed via Google Forms and specifically aimed at undergraduate dental students. Results: A total of 348 students participated in the survey. There was a significant correlation (P > 0.01) between student satisfaction with hybrid learning and their experi
... Show MoreBackground: Tooth wear is one of the most concerning problems of the current dental practice especially among older subjects. The aim of this study is to determine the severity of tooth wear and its relation with selected salivary variables (salivary pH and vitamin C level) among a group of older adults in Mosul city/Iraq. Materials and methods: All subjects (30 subjects) of both gender tookpart in the current study; sixteen of them were older adults (55-65 years) and compared with fourteen middle-aged adults (30-40 years) at Textile factory in Mosul city/Iraq. Unstimulated salivary samples were collected and salivary pH was immediately measured. Salivary vitamin C level was determined colormetrically. Severity of tooth wear was determined
... Show MoreIn recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne
... Show MoreThere are numerous bidirectional interactions between the reproductive system and the liver. Sex steroids regulate metabolic health through signaling effects in both peripheral and central metabolic tissues, including adipose tissue, liver, skeletal muscle, and brain, and have a role in the etiology of structural and functional liver diseases. Blood samples were obtained from 90 healthy women (control group) and 90 women that have hormonal changes (patients’ group). The levels of reproductive hormones (follicle stimulation hormone/FSH, luteinizing hormone/LH, estradiol/E2, progesterone/P4) were measured by using fully automated Cobas E411, whereas those of liver enzymes (alanine transaminase /ALT, aspartate aminotransferase/AST, a
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More