A number of glow discharge experiments has been carried out in a relatively large-volume metallic vacuum chamber containing argon at low pressure and immersed in an inhomogeneous magnetic field generated by a solenoidal coil capable of delivering 2100G. Two Paschen curves demonstrating the dependence of the discharge voltage on sparking parameter Pd and magnetic field strength B were deduced. A graphical correlation showing the behaviour of the voltage difference from the two curves on the ratio B/Pd was constructed. Investigations showed a reduction in the nominal impedance of the discharge device of nearly 20% when B reaches a value of 525G. Plasma confinement regions were found around the internal surface of the chamber at the entrance of the electrodes which may be attributed to pressure gradient by JxB effects as well as ExB drifts.
The covid-19 global pandemic has influenced the day-to-day lives of people across the world. One consequence of this has been significant distortion to the subjective speed at which people feel like time is passing. To date, temporal distortions during covid-19 have mainly been studied in Europe. The current study therefore sought to explore experiences of the passage of time in Iraq. An online questionnaire was used to explore the passage of time during the day, week and the 11 months since the first period of covid-19 restrictions were imposed in Iraq. The questionnaire also measured affective and demographic factors, and task-load. The results showed that distortions to the passage of time were widespread in Iraq. Participants co
... Show MoreA vocative expression can be defined as an expression of direct address where the participant identity is set forth explicitly within a sentence. This study aims at showing how the vocative particles are used in literally texts, namely in the short story “The Garden Party" written by Kathryn Mansfield and identifying the forms of these vocative particles as used by the characters along with the functions of these vocative particles. For the analysis of vocative forms, the researcher used Quirk and Greenbaum (1973) model. Functionally, the data were analyzed based on Quirk et al. (1985) model. However, the results of this study shows that the characters in “The Garden Party” short story used various forms of vocative particles and
... Show MoreRouting protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz
... Show MoreBackground: Osteogenesis imperfecta (OI) is a rare congenital condition that results in bone fragility, recurrent fractures, and various extra-skeletal manifestations. Currently, intravenous bisphosphonate is the mainstay of medical treatment in OI. Objective: To identify the effect of current management strategies on Iraqi children diagnosed with OI. Methods: A retrospective study enrolled OI patients who were registered in Central Child Teaching Hospital, Baghdad, Iraq, from January 2015 to December 2022. We enrolled confirmed OI cases (either clinically and/or radiologically) who received cyclic pamidronate therapy for at least 3 cycles. They neither received other types of bisphosphonates nor underwent surgical intervention. Res
... Show MoreSoftware-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an
... Show More