A computational investigation is carried out in the field of charged –particle optics with the aid of numerical analysis method using the personal computer. The work is concerned with the design of electron gun with space-charge effect. The Finite element method (FEM) used in the solution of Poison's equation for determine the axial potential distribution of the two-electrode immersion lens operated under zero magnification condition , and from the solution of the paraxial ray equation the optical properties such as the focal length , spherical and chromatic aberration coefficients are determined, also a calculation of the brightness and perveance for the lens. The electrodes geometry was determined in two and three dimension with the aid of new drawing software called SIMION 7 and the electron beam trajectory under zero magnification conditions has been determine for these electrodes.
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe problem of divorce from the phenomena that characterized the nature of privacy,
although their impact beyond the individual to include the community as a whole, the parties
to the relationship affected by divorce caused them harm moral and material for a long time,
resulting imbalance in the personal relationship and family and social relations because of the
high divorce rates, particularly in Iraq high rates of 28690 thousand cases in 2004 to 59 515
thousand cases in 2011 and an increase of more than (100%) during the period above, and this
rise caused by aggravation of many of the problems led the reasons for social, economic and
incompatibility spouses, health and lack of reproduction, not spending The wife a
The purpose of this research is to investigate the impact of corrosive environment (corrosive ferric chloride of 1, 2, 5, 6% wt. at room temperature), immersion period of (48, 72, 96, 120, 144 hours), and surface roughness on pitting corrosion characteristics and use the data to build an artificial neural network and test its ability to predict the depth and intensity of pitting corrosion in a variety of conditions. Pit density and depth were calculated using a pitting corrosion test on carbon steel (C-4130). Pitting corrosion experimental tests were used to develop artificial neural network (ANN) models for predicting pitting corrosion characteristics. It was found that artificial neural network models were shown to be
... Show MoreThe purpose of this paper is to apply styrene butadiene rubber (SBR) as virgin alongside expanded polystyrene (EPS) resin as a recycled polymer after consumption in the presence of bagasse fibers (BF) as biomass source derived from sugarcane in different concentrations to reinforce this polymeric matrix to form affordable composites that can be used in manufacturing low-cost and sustainable car interior-trim constituents.
SBR and EPS represent an example for thermoplastic elastomers (
In this paper, an experimental study was conducted to enhance the thermal performance of a double-pass solar air heater (SAH) using phase change material (PCM) for thermal storage at climatic conditions of Baghdad city - Iraq. The double-pass solar air heater integrated with thermal storage system was manufactured and tested to ensure that the air heating reserved after the absence of the sun. The rectangular cavity filled with paraffin wax was used as a latent heat storage and incorporated into the lower channel of solar air heater. Experiments were carried out to evaluate the charging and discharging characteristics of two similar designed solar air collectors with and without using phase change material at a constant
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreBackground: Hyperlipidemia is an elevated fat (lipids), mostly cholesterol and triglycerides, in the blood. These lipids usually bind to proteins to remain circulated so-called lipoprotein. Aims of the study: To determine taste detection threshold and estimate the trace elements (zinc) in serum and saliva of those patients and compare all of these with healthy control subjects. Methods: Eighty subjects were incorporated in this study, thy were divided into two groups: forty patients on simvastatin treatment age between (35-60) years, and forty healthy control of age range between (35-60) years. Saliva was collected by non-stimulated technique within 10 minutes. Serum was obtained from each subject. Zinc was estimated in serum and saliva
... Show MoreLet h is Γ−(λ,δ) – derivation on prime Γ−near-ring G and K be a nonzero semi-group ideal of G and δ(K) = K, then the purpose of this paper is to prove the following :- (a) If λ is onto on G, λ(K) = K, λ(0) = 0 and h acts like Γ−hom. or acts like anti–Γ−hom. on K, then h(K) = {0}.(b) If h + h is an additive on K, then (G, +) is abelian.