The influence of the grounded electrode area on the ignition voltage in capcitively coupled radio frequency discharge at 13.56 MHz in argon gas is studied experimentally. The results indicate a systematic decrease of the breakdown voltage with increasing grounded electrode area for the same pd value. Results show that the secondary ionization coefficient γ increases with the increase of grounded electrode area. Furthermore, results also the discharge current at the breakdown voltage increases almost linearly with the increase of electrode area suggesting an almost constant current density.
Numerical simulations have been carried out on the solar chimney power plant systems. This paper gives the flow field analysis for a solar chimney power generation project located in Baghdad. The continuity, Naver-stockes, energy and radiation transfer equations have been solved and carried out by Fluent software. The governing equations are solved for incompressible, 3-D, steady state, turbulent is approximated by a standard k - model with Boussiuesq approximation to study and evaluate the performance of solar chimney power plant in Baghdad city of Iraq. The different geometric parameters of project are assumed such as collector diameter and chimney height at different working conditions of solar radiation intensity (300,450,600,750
... Show MoreBackground: The formation of white spot lesions around fixed orthodontic attachments is a common complication during and after fixed orthodontic treatment, which hinders the result of a successfully completed orthodontic treatment. The aim of the study was to assess the effectiveness of the Caries Infiltrant (ICON®) on prevention of caries on the smooth enamel surface when applied alone or combined with conventional adhesives. Materials and methods: Seventy eight human premolar enamel discs were randomly assigned to six groups (n=13). The discs were etched and treated with resins of different monomer content forming the following groups: (1)Untreated etched samples served as the negative control, (2) ICON® (DMG), (3) Adper™ S
... Show MoreNowadays, most of the on-chip plasmonic single-photon sources emit an unpolarized stream of single photons that demand a subsequent polarizer stage in a practical quantum cryptography system. In this paper, we numerically demonstrated the coupling of the light emitted from a quantum emitter (QE) at 700 nm wavelength to the propagation mode supported by an on-chip hybrid plasmonic waveguide (HPW) polarization rotator. Our results proved that the light emitted is linearly polarized at 0º, 45º/−45º, and 90º with propagation lengths of 5 μm, 3.3 μm, and 3.9 μm, respectively. Moreover, high power-conversion efficiency was obtained from an applied transverse magnetic (TM) mode (0º-polarization) to a transverse electric (TE) (90º-polari
... Show MoreThe dependence of the energy losses or the stopping power for the ion contribution in D- T hot plasma fuels upon the corresponding energies and the related penetrating factorare arrive by using by a theoretical approximation models. In this work we reach a compatible agreement between our results and the corresponding experimental results.
Most pathological effects of lead on the body are due to ability of lead to bind with important cellular molecules of various tissues and organs leading to formation abnormal molecules and thus to emergence of pathological conditions. To evaluation the risk to the health status of Iraqi workers who work in the batteries industry, expression of three types of calmodulin related genes were examined. Blood samples were collected from worker working in Iraqi industry of batteries (located in Al-Waziriya), then RNAs extraction were done thereby gene expression for Calcium/Calmodulin- dependent protein kinase2 (CaMKK2), C-X-C Chemokine receptor 4 (CXCR4) and mitogen activated protein kinase kinase 6 (MAP2K6) was done for each sample by using RT-q
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More