In this work, we carried out an experimental study of thedusty
plasma by taking the dust material Fe3O4 with radius of the any grain
0.1μm - 0.5μm. In experiment we use air in the vacuum chamber
system under different low pressure (0.1-1) Torr. The results
illustrated that the present of dust particles in the air plasma did not
effect on Paschen minimum which is 0.5 without dust and with Fe3O4
dusty grains.
The effect of Fe3O4 dust particles on plasma parameters can be
notice in direct current system in glow discharge region. The plasma
parameters which were studied in this work represent plasma
potential, floating potential,electron saturation current, temperature
of the electron, the density of the (electron, ion), and Debye length.
The measurements of parameters are taken by four cylindrical probes
which diagnosed at distance 4cm from the diameter of the cathode in
Paschen minimum at pressure 0.5 Torr. The diameter profiles of
plasma parameters in the present of dust are non- uniform. Plasma
potential and the floating potential of probe becomes more negatively
when the dust immersed into plasma region. The electron density
increases in the present of dust particle which lead to decrease the
electron temperature and Debye length. The behavior of those
parameters shows the discharge current and discharge voltage
increases without dust while the discharge current and voltage
decreases when Fe3O4 dust particles embedded.
CdO:NiO/Si solar cell film was fabricated via deposition of CdO:NiO in different concentrations 1%, 3%, and 5% for NiO thin films in R.T and 723K, on n-type silicon substrate with approximately 200 nm thickness using pulse laser deposition. CdO:NiO/n-Si solar cell photovoltaic properties were examined under 60 mW/cm2 intensity illumination. The highest efficiency of the solar cell is 2.4% when the NiO concentration is 0.05 at 723K.
The research aims at shedding light on the impact of the organizational commitment on the performance of the Iraqi insurance company as a service company that provides many services to customers both internal (individuals working) or external, Whenever the company was able to adopt new concepts to increase the understanding and knowledge of how their attention to individuals working and to provide an appropriate working environment, and to clarify the objectives and strategies for them, and create a sense of their importance, as reflected on job performance in attracting new customers, and build long-term relationships with them . In order to achieve this, the research relied on the questionnaire as a main tool for collecting data and in
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreLinear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan
... Show MoreObjective: This study goal was to screen participants from different settings in Baghdad for depression using Beck Depression Inventory (BDI) scale and identify factors influencing the levels of depression. Methods: This cross-sectional study included a convenience sample of 313 people from four settings (teaching hospital, college of medicine, college of pharmacy, and high school) in Baghdad, Iraq. The participants were screened using paper survey relying on the BDI scale during spring 2018. Using multiple linear regression analysis, we measured the association between depression scores and six participant factors. Results: The overall prevalence of depression in our sample was 57.2%. Female participants had higher BDI
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreMachine Learning (ML) algorithms are increasingly being utilized in the medical field to manage and diagnose diseases, leading to improved patient treatment and disease management. Several recent studies have found that Covid-19 patients have a higher incidence of blood clots, and understanding the pathological pathways that lead to blood clot formation (thrombogenesis) is critical. Current methods of reporting thrombogenesis-related fluid dynamic metrics for patient-specific anatomies are based on computational fluid dynamics (CFD) analysis, which can take weeks to months for a single patient. In this paper, we propose a ML-based method for rapid thrombogenesis prediction in the carotid artery of Covid-19 patients. Our proposed system aims
... Show MoreKE Sharquie, AA Noaimi, HA Al-Mudaris, Journal of Drugs in Dermatology: JDD, 2013 - Cited by 22