In this theoretical paper and depending on the optimization synthesis method for electron magnetic lenses a theoretical computational investigation was carried out to calculate the Resolving Power for the symmetrical double pole piece magnetic lenses, under the absence of magnetic saturation, operated by the mode of telescopic operation by using symmetrical magnetic field for some analytical functions well-known in electron optics such as Glaser’s Bell-shaped model, Grivet-Lenz model, Gaussian field model and Hyperbolic tangent field model. This work can be extended further by using the same or other models for asymmetrical or symmetrical axial magnetic field under magnetic saturation or absence of magnetic saturation, operated by other modes operation.
While analytical solutions to Quadratic Assignment Problems (QAP) have indeed been since a long time, the expanding use of Evolutionary Algorithms (EAs) for similar issues gives a framework for dealing with QAP with an extraordinarily broad scope. The study's key contribution is that it normalizes all of the criteria into a single scale, regardless of their measurement systems or the requirements of minimum or maximum, relieving the researchers of the exhaustively quantifying the quality criteria. A tabu search algorithm for quadratic assignment problems (TSQAP) is proposed, which combines the limitations of tabu search with a discrete assignment problem. The effectiveness of the proposed technique has been compared to well-established a
... Show MoreStream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreA hyperboloid solar concentrator (HSC) was designed with a truncation angle side to the entrance aperture by simulation in the Zemax Optical Design software. The (HSC) has a wide exposure range to solar radiation due to the relatively large entrance aperture. The design consists of an entrance aperture facing the sun to obtain the largest possible amount of solar radiation, and a small exit aperture compared to the entrance aperture whose mission is to receive solar radiation after it enters the entrance aperture and reflects it from the inner reflective walls of the (HSC). In the exit aperture, there is a detector to measure the number of rays incident on it, which is a measure of the optical efficiency of the s
... Show MoreThe production companies in the Iraqi industry environment facing many of the problems related to the management of inventory and control In particular in determining the quantities inventory that should be hold it. Because these companies adoption on personal experience and some simple mathematical methods which lead to the identification of inappropriate quantities of inventory.
This research aims to identify the economic quantity of production and purchase for the Pepsi can 330ml and essential components in Baghdad soft drinks Company in an environment dominated by cases of non ensure and High fluctuating as a result of fluctuating demand volumes and costs ass
... Show MoreThis study was carried out in Baghdad (Al-Jadiriya) in 2006 by detecting ability of aquatic reed plant to remove heavy metals (Chromium) from waste water by batch process of adsorption with considering that acidic solution is best selection for such process with constant initial chromium concentration(60 mg/l),speed of shaking(300 rpm), temperature (30 Co) and constant contact time (4 h) but with different weights of adsorbent (reed) (0.5 ,1 ,2 ,3 and 4 )gm for each 100 ml volume of sample . The results showed that the percentage of the removed chromium were ( 8% ,17.5% ,31% ,40% and 50%) respectively for each sample according to the mass of adsorb
... Show MoreA series of experiments were conducted for the first time in Iraq to evaluate the efficiency of five plant leaves extracts (Ibicella lutea, Nerium oleander, Clerodendron inerme, Allium cepa and Eucalyptus spp.) in treating the common carp (Cyprinus carpio) infected with monogenetic trematodes of genera Dactylogyrus. Five different concentrations of such extracts were used to bathe fishes for 5,10,15,20 and 25 minutes. A concentration of 15% A. cepa for 25 minutes of bath exposure was affective in trematode eradication. Extracts of both Eucalyptus and N. oleander at a concentration of 10% each were also affective for ten minutes exposure. Extracts of C. inerme had no any effect on such parasites. On the otherhand, extracts of 1. hitea caused
... Show More