Preferred Language
Articles
/
jih-275
Magnetic Lens Design Using Analytical Target Field Function

Analytical field target function has been considered to represent the axial magnetic field distribution of double polepiece symmetric magnetic lens. In this article, with aid of the proposed target function, the syntheses procedure is dependent. The effect of the main two coffectin optimization parameters on the lens field distribution, polepieces shape, and the objective focal prosperities for lenses operated under zero magnification mode has been studied. The results have shown that the objective properties evaluated in sense of the inverse design procedure are in an excellent correspondence with that of analysis approach. Where the optical properties enhance as the field distribution of the electron lens distributed along a narrow axial interval with high field peak and virsa.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Design and Construction of Electrical Magnate to Study its Efficiency and the Optimum Parameters to Produce Alkaline Magnetic Water and Treating the Sea Water to be Suitable for Irrigation

Abstract

Electrical magnate  was designed and constructed,  the optimum Magnetic flux  and the effect of time on the physical properties of the alkaline (magnetic water) produced from the bottled drinking water [the total dissolved solids (TDS) or the electrical conductivity, and pH] were studied, to simulate ZamZam water in Mekka Saudi Arabia. Also, the efficiency of magnetic field from this designed electrical magnate in decreasing the TDS of sea water (of 1500 ppm NaCl Content), to convert it to water suitable for irrigation (TDS<1000 ppm) was investigated in this work.The results show that the magnetic flux from our designed electrical magnate in the range of (0.013- 0.08) Tesla and 30 minut

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Space Charge Effect for Design Electron Gun Using Five Electrode Immersion Electrostatic Lenses

 Computer theoretical study has been carried out on the design of five electrode immersion electrostatic lens used in electron gun application. The finite element method (FEM) is used in the solution of the Poisson's equation fro determine axial potential distribution, the electron trajectory under Zero magnification condition .      The optical  properties : focal length ,spherical and chromatic aberrations are calculated,From studying the properties of the designed electron gun. we have good futures for these  electron gun where are abeam current 4*10-4A    can be supplied by using cathode tip of radius 100 nm.

View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Magnetic Resonance Imaging
Alpha shape theory for 3D visualization and volumetric measurement of brain tumor progression using magnetic resonance images

Alpha shape theory for 3D visualization and volumetric measurement of brain tumor progression using magnetic resonance images

Scopus (28)
Crossref (23)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
The Dependence of The Gravitational Lensing Properties on The Lens And Source Redshifts

    This work aims to investigate the dependence of gravitational lensing properties on the lens redshift and source redshift.

The angular diameter distance hereafter referred to as ADD has been determined using two different numerical integral methods, Simpson's rule, and definite integral methods. Both of those two methods gave identical results. In addition, observational data of gravitational Lensing systems have been used to find the most probable value of lens redshift and source redshift. The result showed that the lens redshift and source redshift are more likely to occur in the ranges of zL=0.2-0.6 and zS=1-3, respectively.

Einstein radius and the critical surface mass density

... Show More
Scopus (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Mar 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Simulation Study of Sputtering Yield of Zn Target Bombarded By Xenon Ions

    Using a reduction of TRIM simulation data, the sputtering yield behaviour of Zinc target bombard by heavy Xenon ions plasma is studied. The sputtering yield as a function of Zinc layer width, Xenon ion number, energy of ions, and the angle of ion incidence are calculated and illustrated graphically. The corresponding energy loss due to ionization, vacancies and phonons, are graphically shown and discussed. Further, we fit the calculations and expressions for fitted curves are presented with its coefficients.

View Publication Preview PDF
Publication Date
Thu Apr 11 2019
Journal Name
Scientific Reports
Small-Molecule Ferroptotic Agents with Potential to Selectively Target Cancer Stem Cells
Abstract<p>Effective management of advanced cancer requires systemic treatment including small molecules that target unique features of aggressive tumor cells. At the same time, tumors are heterogeneous and current evidence suggests that a subpopulation of tumor cells, called tumor initiating or cancer stem cells, are responsible for metastatic dissemination, tumor relapse and possibly drug resistance. Classical apoptotic drugs are less effective against this critical subpopulation. In the course of generating a library of open-chain epothilones, we discovered a new class of small molecule anticancer agents that has no effect on tubulin but instead kills selected cancer cell lines by harnessing reactive oxygen </p> ... Show More
Scopus (51)
Crossref (51)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Using Visual Cryptography and hash function for Fragile Watermarking to Detect Electronic Document Forgery

     Recent developments in technology and the area of digital communications have rendered digital images increasingly susceptible to tampering and alteration by persons who are not authorized to do so. This may appear to be acceptable, especially if an image editing process is necessary to delete or add a particular scene that improves the quality the image. But what about images used in authorized governmental transactions? The consequences can be severe; any altered document is considered forged under the law and may cause confusion. Also, any document that cannot be verified as being authentic is regarded as a fake and cannot be used, inflicting harm on people. The suggested work intends to reduce fraud in electronic documents u

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Apr 13 2012
Journal Name
Kut Journal For Economic And Administrative Sciences
Using Different Methods to Estimate the Parameters of Probability Death Density Function with Application

In this paper, the maximum likelihood estimates for parameter ( ) of two parameter's Weibull are studied, as well as white estimators and (Bain & Antle) estimators, also Bayes estimator for scale parameter ( ), the simulation procedures are used to find the estimators and comparing between them using MSE. Also the application is done on the data for 20 patients suffering from a headache disease.

Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Estimation the reliability function of multi state system by using Direct Partial Logic Derivative

In this research is estimated the function of reliability dynamic of multi state systems  and their compounds and for three types of systems (serial, parallel, 2-out-of-3) and about two states (Failure and repair) depending on calculating the structur function allow to describing the behavior of

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Text Hiding in Color Images Using the Secret Key Transformation Function in GF (2n)

Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.

View Publication Preview PDF