In this paper, the path of the extracted and focused ions by the electrostatic lense having three electrodes of the same size and shape have been studied. However, the first and third electrodes had a different potential from the second electrode and the distance between any three electrodes was (d).The beams of the charged particles were controlled by using electrostatic fields which are used for accelerating and focusing. This paper focuses also on the effect of electrodes potentials on ion beam focusing. It is found that the best focusing was achieved when the values of the potential of the first and third electrode are equal to half of the value of the second electrode. Concerning transmiting and acumulating the ions beams, the study shows that these beams stayed fixed and steady when their paths were doubled, without any change in extracted beam density. This method is called Plasma Portation.
ole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThis research aims to distinguish the reef environment from the non-reef environment. The Oligocene-Miocene-succussion in western Iraq was selected as a case study, represented by the reefal limestone facies of the Anah Formation (Late Oligocene) deposited in reef-back reef environments, dolomitic limestone of the Euphrates Formation (Early Miocene) deposited in open sea environments, and gypsiferous marly limestone of the Fatha Formation (Middle Miocene) deposited in a lagoonal environment. The content of the rare earth elements (REEs) (La, Ce, Pr, Nd, Sm, Eu, Gd, Tb, Dy, Er, Ho, Tm, Yb, Lu, and Y) in reef facies appear to be much lower than of those in the non-reef facies. The open sea facies have a low content of REEs due to bein
... Show MoreGelatin a promising biomaterial which is useful and interesting natural polymer which offer possibilities of chemical modification through grafted copolymerization with an saturated acid anhydride such as methyl nadic anhydride formatted gelatin –g- methyl nadic anhydride copolymer (A1), then modified to its corresponding polymer (A2) by substituted salbutamol as useful derivative as biomaterial .the prepared drug biopolymer was characterization by FTIR spectroscopy and thermal analysis was studied controlled drug release was measured in different buffer solution at 37C0 .
Charge multipole Coulomb scattering form factors in 48Ca nucleus have been reproduced utilizing the theory of nuclear shell. The efficient two-body nuclear potential fpbm is considered to construct the-spin orbit term LS vectors with Harmonic Oscillator HO potential as a wave function of single particle in Fp shell. Discarded spaces ( core + higher configuration) are taken into account through the Core polarization effect by model space with accurate two-body potential of Gogny to interact the LS operating particles with the discarded space pair ( particle-hole) with energy of excitation equal to 2ћω. Gogny interaction has been selected as it had succeeded in nuclear shell theory. The computed results were compared with th
... Show MoreThe aim of this study is to investigate the main causes of the family violence and its
social effects.
The study reveals that main factors causes of the violence are interaction between
multi-factors.
The study shows that the poverty, low educational level, house crowded, large family
size, all of these variables causes of the violence, and then causes of family disorganization
and juvenile delinquency.
The study contain of three sections:
First: Focused on the causes of the violence.
Second: The interaction between multi factors.
Third: Social effects of family violence.
The research tagged (functional enhancement and its reflection on industrial product systems) focused on the possibility of enhancing industrial products in terms of form and functionality in a way that they are able to meet the needs of the user through the impact of technology and modern technologies on the functional enhancement of industrial products and their effectiveness in achieving formal and functional design variables, and producing products Industrial products are highly efficient and durable in order to improve them in order to meet the needs of the user, the transfer of technology between life forms and industrial products is desirable because the functional enhancement processes that occurred in general on industrial produ
... Show MoreIn this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform