This paper describes theoretical modeling of electrostatic mirror based on two cylindrical electrodes, A computational investigation has been carried out on the design and properties of the electrostatic mirror. we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The beam path by using the Bimurzaev technique have been investigated as a mirror trajectory with the aid of Runge – Kutta method. the electrode shape of mirror two electrode has been determined by using package SIMION computer program . The spherical and chromatic aberrations coefficients of mirror has been computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements, i.e. each optical element in optical system at low spherical aberration or low chromatic aberration. Computations have shown that the suggested potential gave rise to mirror when the mirror applied by using the Bimurzaev technique is deduced by having the following parameters: Cs=-7.49*10-7 mm, Cc=-2.15*10-4 mm, fR=4.7*10-3mm, L=6mm, C=1volt, D=500 volt.
The family Chalcididae (Order: Hymenoptera) is known as one of the large chalcidoid wasps with some distinct morphological characters. The first occurrence of two parasitoid species belonging to this family was reported in the Al-Husayniya district Karbala Province, Iraq; which are: Brachymeria podagrica (Fabricius, 1787) and Chalcis myrifex (Sulzer, 1776). Both species were collected by using the sweeping net from orchards during July 2020.
Many writers and scientists hardly differentiate between the two instruments of use
(If) and (if) to convergence in the meaning, as they perform the meaning of the penalty and condition, as the answer relates to his condition, but when linguistic meditation we find a great difference in use in terms of meaning, so this research came to reveal these meanings and was extrapolated applied in Surat al-Maidah By counting the verses in which (if) and (if) the cops were given and looking at their contexts, the connotation of the cops in most places was within the context of probability, which is the origin of its use, given in twenty places of Surat al-Ma'idah, and it had multiple connotations according to the contexts of the verses received
The present paper attempts to establish a distinction between Exochomus negripennis (Er.) and E. quadripustulatus L., depending on the characters of femoral line, male genitalia and spermatheca.
Singled current study on the subject of shorthand in structure designs logos (Iraqi sports clubs model), as the current study Tdmt four chapters, was in the first chapter defines the research problem and its significance, as well as the aim of the research in the know shorthand formal in structure designs logos (Iraqi sports clubs model ), and identifies Find time limits: - slogans Iraqi sports clubs for the years (1956 - 1970), because it represented the years to include designs slogans official Iraqi sports clubs that have been elected in this period for the purpose of examining the reality of the design in the current search. And it represented the spatial limits: - the Republic of Iraq - Iraqi slogans designs sports
... Show MoreThe industrial development and raise the level of income that has emerged clearly in the middle of the last century in many rich and medium rich countries has great influence on the risen of the health care level. Which led to a significant increase in the reconstruction of people over 65 years and this in turn has produced markets for products and services through modifications to the existing products to meet their physical needs. The importance of research also has the universal design of a comprehensive actually so that it covers as much as possible from human physical & cultural activities. The importance of research locally is to concentrate on this subject who has not been taken into consideration so far to accommodate the eld
... Show MoreIn this study, iron was coupled with copper to form a bimetallic compound through a biosynthetic method, which was then used as a catalyst in the Fenton-like processes for removing direct Blue 15 dye (DB15) from aqueous solution. Characterization techniques were applied on the resultant nanoparticles such as SEM, BET, EDAX, FT-IR, XRD, and zeta potential. Specifically, the rounded and shaped as spherical nanoparticles were found for green synthesized iron/copper nanoparticles (G-Fe/Cu NPs) with the size ranging from 32-59 nm, and the surface area was 4.452 m2/g. The effect of different experimental factors was studied in both batch and continuous experiments. These factors were H2O2 concentration, G-Fe/CuNPs amount, pH, initial DB15
... Show MoreIn this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance