The electron mirror phenomenon has been explored to describe the behavior of a probing electron trajectory inside the chamber of scanning electron microscope (SEM). This investigation has been carried out by means of the modulated mirror plot curve technique. This method is based on expanding sample potential to a multipolar form to detect the actual distribution of the trapped charges. Actually an experimental result is used to guiding results of this work toward the accurate side. Results have shown that the influence of each type of multipolar arrangement (monopole, dipole, quadruple, octopole … etc.) mainly depends on the driving potential.
This paper deals with the nonlinear large-angle bending dynamic analysis of curved beams which investigated by modeling wave’s transmission along curved members. The approach depends on the wave propagation in one-dimensional structural element using the method of characteristics. The method of characteristics (MOC) is found to be a suitable method for idealizing the wave propagation inside structural systems. Timoshenko’s beam theory, which includes transverse shear deformation and rotary inertia effects, is adopted in the analysis. Only geometrical non-linearity is considered in this study and the material is assumed to be linearly elastic. Different boundary conditions and loading cases are examined.
From the results obtai
... Show MoreGurney flap (GF) is well-known as one of the most attractive plain flaps because of the simple configuration and effectiveness in improving the lift of the airfoil. Many studies were conducted, but the effects of GF on the various airfoil types need to be further investigated. This study aimed to clarify the effect of GF in the case of the supercritical airfoil RAE2822. This research includes a steady, two-dimensional computational investigation carried out on the supercritical airfoil type RAE-2822 to analyze Gurney flap (GF) effects on the aerodynamic characteristics of this type of airfoil utilizing the Spalart-Allmaras turbulence model within the commercial software Fluent. The airfoil with the Gurney flap was analyz
... Show MoreIn this work, a new development of predictive voltage-tracking control algorithm for Proton Exchange Membrane Fuel Cell (PEMFCs) model, using a neural network technique based on-line auto-tuning intelligent algorithm was proposed. The aim of proposed robust feedback nonlinear neural predictive voltage controller is to find precisely and quickly the optimal hydrogen partial pressure action to control the stack terminal voltage of the (PEMFC) model for N-step ahead prediction. The Chaotic Particle Swarm Optimization (CPSO) implemented as a stable and robust on-line auto-tune algorithm to find the optimal weights for the proposed predictive neural network controller to improve system performance in terms of fast-tracking de
... Show MoreAbstract Background: The human epidermal growth factor receptor 2(HER2) proto-oncogene is overexpressed or amplified in approximately 15%-25% of invasive breast cancers. Approximately 35% of HER2-amplified breast cancers have coamplification of the topoisomerase II-alpha (TOP2A) gene encoding an enzyme that is a major target of anthracyclines. Hence, the determination of genetic alteration (amplification or deletion) of both genes is considered as an important predictive factor that determines the response of breast cancer patients to treatment. The aims of this study are to determinate TOP2A status gene amplification in a set of Iraqi patients with breast cancer that have had an equivocal (2+) and positive HER2/neu by immunohistochemistry
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThis research aims to study the target costing and value chain with their complimentary relationship in reducing product costs, meeting the needs of customer, and achieving strategic competitive advantage for manufacturing corporations in response to face international competition, technological development and continuous changing expectations of customers. No doubt, the target costing and value chain both currently occupy a great deal of the attention of managers and accountants at the manufacturing corporations due to the significance to insure their continuity, growth and development. This significance has been the main motive to examine the role of target costing and value chain in a sample of public corporations of the
... Show MoreGlobally, chronic kidney disease (CKD) has emerged as a significant public health concern, characterized by high rates of morbidity and mortality. To assess the risk of kidney damage, researchers have identified tissue inhibitor of matrix metalloproteinase-2 (TIMP-2) and fatty acid-binding protein-1 (FABP-1) as valuable biomarkers. This study aims to analyse the effectiveness of specific biomarkers in assessing CKD and its associated mechanisms in Iraqi patients. The study was conducted from December 2023 to May 2024. Ninety subjects, aged 48–65 years; including 60 patients with CKD (38 male and 22 female) attended the Baghdad Teaching Hospital/ Medical City/ Dialysis Unit- Baghdad, Iraq. In addition, 30 healthy people (15 male an
... Show More