In this work, we carried out an experimental study of thedusty
plasma by taking the dust material Fe3O4 with radius of the any grain
0.1μm - 0.5μm. In experiment we use air in the vacuum chamber
system under different low pressure (0.1-1) Torr. The results
illustrated that the present of dust particles in the air plasma did not
effect on Paschen minimum which is 0.5 without dust and with Fe3O4
dusty grains.
The effect of Fe3O4 dust particles on plasma parameters can be
notice in direct current system in glow discharge region. The plasma
parameters which were studied in this work represent plasma
potential, floating potential,electron saturation current, temperature
of the electron, the density of the (electron, ion), and Debye length.
The measurements of parameters are taken by four cylindrical probes
which diagnosed at distance 4cm from the diameter of the cathode in
Paschen minimum at pressure 0.5 Torr. The diameter profiles of
plasma parameters in the present of dust are non- uniform. Plasma
potential and the floating potential of probe becomes more negatively
when the dust immersed into plasma region. The electron density
increases in the present of dust particle which lead to decrease the
electron temperature and Debye length. The behavior of those
parameters shows the discharge current and discharge voltage
increases without dust while the discharge current and voltage
decreases when Fe3O4 dust particles embedded.
The concept of social graphic design is one of the most critical areas that highlight the designer's knowledge of social responsibility by employing design skills in community awareness. This study focused on defining social graphic design, the meaning, practices, and strategies for designing awareness posters. This study reviewed two examples of awareness posters that reflect the Saudi designer's practices. The results summarized that social graphic design is a concept not taught directly but gained from permanent practice in designing awareness posters that interact with community issues. The designer's understanding of his social events and their sensing in the visual form of a poster reflects the designer's social awareness. Social g
... Show MoreWater supply and distribution networks play an important role in our daily activities. They make a substantial contribution to public health by providing potable water for public consumption and non-potable applications such as firefighters and other purposes such as irrigation. This study used ArcMap 10.8 and WaterGEMS CONNECT Edition update 1 version to create a hydraulic network model to simulate the pipes’ network. Detailed network information, including pipe lengths, layouts, and diameters, was given by the Baghdad Water Department. The TUF-2000H Handheld digital ultrasonic flow meter has been used to measure the water flows in the network’s source nodes. In eight junctions,
This study included isolation of some active materials from Curcuma longa such as tannins, saponins and volatile oils with percentage of 59%, 31%, and 9% respectively. Also the study included the determination of minerals in Curcuma longa such as " Na, Ca and K" using Flame photometer. The concentrations of these minerals were (14 ppm),(10 ppm) and )76 ppm) respectively. The anti-bacterial activity study was performed for the active materials isolated from Curcuma longa against two genus of pathogenic bacteria, Escherichia Coli and Staphylococcus aurous by using agar-well diffusion method. It appeared from this study that all of the extraction have inhibitory effect on bacteria was used. The inhibition zone diameter varies with
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreIn this study, low cost biosorbent ̶inactive biomass (IB) granules (dp=0.433mm) taken from drying beds of Al-Rustomia Wastewater Treatment Plant, Baghdad-Iraq were used for investigating the optimum conditions of Pb(II), Cu(II), and Ni(II) biosorption from aqueous solutions. Various physico-chemical parameters such as initial metal ion concentration (50 to 200 mg/l), equilibrium time (0-180 min), pH (2-9), agitation speed (50-200 rpm), particles size (0.433 mm), and adsorbent dosage (0.05-1 g/100 ml) were studied. Six mathematical models describing the biosorption equilibrium and isotherm constants were tested to find the maximum uptake capacities: Langmuir, Freundlich, Redlich–Peterson, Sips, Khan, and Toth models. The best fit to the P
... Show More