Analytical field target function has been considered to represent the axial magnetic field distribution of double polepiece symmetric magnetic lens. In this article, with aid of the proposed target function, the syntheses procedure is dependent. The effect of the main two coffectin optimization parameters on the lens field distribution, polepieces shape, and the objective focal prosperities for lenses operated under zero magnification mode has been studied. The results have shown that the objective properties evaluated in sense of the inverse design procedure are in an excellent correspondence with that of analysis approach. Where the optical properties enhance as the field distribution of the electron lens distributed along a narrow axial interval with high field peak and virsa.
Abstract
Electrical magnate was designed and constructed, the optimum Magnetic flux and the effect of time on the physical properties of the alkaline (magnetic water) produced from the bottled drinking water [the total dissolved solids (TDS) or the electrical conductivity, and pH] were studied, to simulate ZamZam water in Mekka Saudi Arabia. Also, the efficiency of magnetic field from this designed electrical magnate in decreasing the TDS of sea water (of 1500 ppm NaCl Content), to convert it to water suitable for irrigation (TDS<1000 ppm) was investigated in this work.The results show that the magnetic flux from our designed electrical magnate in the range of (0.013- 0.08) Tesla and 30 minut
... Show MoreComputer theoretical study has been carried out on the design of five electrode immersion electrostatic lens used in electron gun application. The finite element method (FEM) is used in the solution of the Poisson's equation fro determine axial potential distribution, the electron trajectory under Zero magnification condition . The optical properties : focal length ,spherical and chromatic aberrations are calculated,From studying the properties of the designed electron gun. we have good futures for these electron gun where are abeam current 4*10-4A can be supplied by using cathode tip of radius 100 nm.
Alpha shape theory for 3D visualization and volumetric measurement of brain tumor progression using magnetic resonance images
This work aims to investigate the dependence of gravitational lensing properties on the lens redshift and source redshift.
The angular diameter distance hereafter referred to as ADD has been determined using two different numerical integral methods, Simpson's rule, and definite integral methods. Both of those two methods gave identical results. In addition, observational data of gravitational Lensing systems have been used to find the most probable value of lens redshift and source redshift. The result showed that the lens redshift and source redshift are more likely to occur in the ranges of zL=0.2-0.6 and zS=1-3, respectively.
Einstein radius and the critical surface mass density
... Show MoreUsing a reduction of TRIM simulation data, the sputtering yield behaviour of Zinc target bombard by heavy Xenon ions plasma is studied. The sputtering yield as a function of Zinc layer width, Xenon ion number, energy of ions, and the angle of ion incidence are calculated and illustrated graphically. The corresponding energy loss due to ionization, vacancies and phonons, are graphically shown and discussed. Further, we fit the calculations and expressions for fitted curves are presented with its coefficients.
Effective management of advanced cancer requires systemic treatment including small molecules that target unique features of aggressive tumor cells. At the same time, tumors are heterogeneous and current evidence suggests that a subpopulation of tumor cells, called tumor initiating or cancer stem cells, are responsible for metastatic dissemination, tumor relapse and possibly drug resistance. Classical apoptotic drugs are less effective against this critical subpopulation. In the course of generating a library of open-chain epothilones, we discovered a new class of small molecule anticancer agents that has no effect on tubulin but instead kills selected cancer cell lines by harnessing reactive oxygen
Recent developments in technology and the area of digital communications have rendered digital images increasingly susceptible to tampering and alteration by persons who are not authorized to do so. This may appear to be acceptable, especially if an image editing process is necessary to delete or add a particular scene that improves the quality the image. But what about images used in authorized governmental transactions? The consequences can be severe; any altered document is considered forged under the law and may cause confusion. Also, any document that cannot be verified as being authentic is regarded as a fake and cannot be used, inflicting harm on people. The suggested work intends to reduce fraud in electronic documents u
... Show MoreIn this paper, the maximum likelihood estimates for parameter ( ) of two parameter's Weibull are studied, as well as white estimators and (Bain & Antle) estimators, also Bayes estimator for scale parameter ( ), the simulation procedures are used to find the estimators and comparing between them using MSE. Also the application is done on the data for 20 patients suffering from a headache disease.
In this research is estimated the function of reliability dynamic of multi state systems and their compounds and for three types of systems (serial, parallel, 2-out-of-3) and about two states (Failure and repair) depending on calculating the structur function allow to describing the behavior of
Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.