Preferred Language
Articles
/
jcoeduw-550
Computer-Aided-Design of low aberration electrostatic Immersion lens
...Show More Authors

A computerized investigation has been carried out to design an immersion lens
with low aberration operating under zero magnification condition using inverse problem.
The aberration is highly dependent on the shape of electrodes, for a preassigned electron
beam trajectory the paraxial-ray-equation is solved to determine the electrostatic potential
and field distribution.
From the knowledge of the potential and its first and second derivative the
electron optical properties were computed, the electrode geometry was determined from
the solution of Laplace equation.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 01 2008
Journal Name
Al-khwarizmi Engineering Journal
Impact Energy of 100Cr6 under low different velocities
...Show More Authors

This study has been undertaken to postulate the mechanism of impact test at low velocities. Thin-walled tubes of 100Cr6 were deformed under axial compression. In the present work there are seven velocities (4.429,4.652,5.240,5.600,5.942,6.264, 6.569) m\sec were applied to show how they effect the load, change in length, also the kinetic energy. However, the comparison between the obtained results and the other studies (Alexandar[3] , Abramowicz[4], Ayad[5]) was made the present work and Ayad data show good agreement. Load, change in length, kinetic energy were determined to understand the impact test.

View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Analysis of computer textbooks content for intermediate stage according to the theory of multiple intelligence
...Show More Authors

The purpose of current study is to analyze the computer textbooks content for intermediate stage in Iraq according to the theory of multiple intelligence. By answering the following question “what is the percentage of availability of multiple intelligence in the content of the computer textbooks on intermediate stage (grade I, II) for the academic year (2017-2018)? The researcher followed the descriptive analytical research approach (content analysis), and adopted an explicit idea for registration. The research tool was prepared according the Gardner’s classification of multiple intelligence. It has proven validity and reliability. The study found the percentage of multiple intelligence in the content of computer textbooks for the in

... Show More
View Publication Preview PDF
Publication Date
Tue May 15 2018
Pre‐low noise amplifier (LNA) filtering linearisation method for low‐power ultra‐wideband complementary metal oxide semiconductor LNA
...Show More Authors

View Publication
Crossref (3)
Clarivate Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Mon May 21 2007
Journal Name
Journal Of Planner And Development
Using the Input - Output Model in building the economic plan using the computer
...Show More Authors

The origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application.

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
The study of the bending property of the epoxy (Ep / MgO) and (Ep/SiO2) composites in natural conditions and after immersion in chemical solution
...Show More Authors

In this paper, a polymer-based composite material was prepared by hand Lay-up method consisting of epoxy resin as a base material reinforced by magnesium oxide powder once and silicon dioxide powder again and with different weight ratios (3, 6, 9 and 12) wt %. The three-point bending test was performed in normal conditions and after immersion in sulfuric acid. The results showed that the bending value decreased with the increase of the weighted ratio of the reinforcement material (MgO, SiO2). The Bending of samples reinforced by SiO2 was found to be less than the bending of samples reinforced by particles (MgO). For example, the bending of the SiO2 sample (0.32 mm) at the weighted ratio (3%) and for the MgO (0.18mm) sample at the weight

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 01 2024
Journal Name
Journal Of Engineering
Orbital Prosthesis Rehabilitation in Biomedical Engineering by Means of Computer Vision-Photogrammetry and 3D Prototyping
...Show More Authors

Eye loss may be caused as a result of eye trauma, accidents, or malignant tumors, which leads the patient to undergo surgery to remove the damaged parts. This research examines the potential of computer vision represented by Structure from Motion (SfM) photogrammetry in fabricating the orbital prosthesis as a noninvasive and low-cost technique. A low-cost camera was used to collect the data towards extracting the dense 3D data of the patient facial features following Structure from Motion-Multi View Stereo (SfM-MVS) algorithms. To restore the defective orbital, a Reverse Engineering (RE) based approach has been applied using the similarity RE algorithms based on the opposite healthy eye to rehabilitate the defected orbital precisely

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
A computer experiment to study the charging process of dust grains in negative ion plasma
...Show More Authors

This work presents a computer studying to simulate the charging process of a dust grain immersed in plasma with negative ions. The study based on the discrete charging model. The model was developed to take into account the effect of negative ions on charging process of dust grain.
The model was translated to a numerical calculation by using computer programs. The program of model has been written with FORTRAN programming language to calculate the charging process for a dust particle in plasma with negative ion, the time distribution of a dust charge, number charge equilibrium and charging time for different value of ηe (ratio of number density of electron to number density of positive ion).

View Publication Preview PDF
Publication Date
Wed Apr 03 2019
Journal Name
Al-kindy College Medical Journal
Low Back Pain and Obesity (Review Article)
...Show More Authors

Low back pain a major causes of morbidity throughout the world and it is a most debilitating condition ,and can lead to decreased physical function ,compromised quality of life, and psychological distress.

Obesity is nowadays a pandemic condition. Obese subjects are commonly characterized by musculoskeletal disorders and particularly by non-specific LBP. However, the relationship between obesity and LBP remain to date unsupported by objective measurements of mechanical behavior of spine and it is morphology in obese subjects.                                   &nb

... Show More
View Publication Preview PDF
Crossref