ALi Hussein, Qais Algwari (Author)
March 2023 ,Pages 12.0-21.0
Abstract: In this paper, the rise time of the exciting voltage on the DC corona discharge characteristics in a coaxial electrode system is presented. The current one-dimensional simulation study focused on the distribution of the plasma species (ions and electrons as well as the excited atoms) during two different times of the applied voltage climb was classified as a fast rise time (615 ns) and a slow rise time (2710 ns). The growth time of the corona excited voltage was controlled by the external feed RC circuit that connected with the central electrode. The simulation results reveal that the corona inception which occurs at a fast rise time produces more dense plasma charged species, while the density of the excited atoms is not much affected by the applied voltage climb time. The density of excited atoms tends to depend on the rise time of the exciting voltage at the steady state.
Zozan Hussain, zeina Abdul-Rahmman, Ghada Abdallh, Hassaan Thabet (Author)
March 2023 ,Pages 22.0-30.0
Abstract: Cell phones, also known as mobile or portable phones, have become an essential part of contemporary communication technologies. In some regions of the world, they are even the only available means of communication, as they are so well-liked for allowing people to communicate with one another without having any impact on their movements. Cell phones are becoming increasingly popular, with more than 50% of people in some nations owning one. The industrial community anticipates that by the year 2030, there will be more than 8 billion users worldwide. To accommodate broadcast and reception, more cell phone stations (towers) are being built. These stations, which are radio antennas, work to protect connections with cellular telephone equipment while using minimum power. The goal of this proposed study is to measure the electromagnetic fields radiated by cell phone towers and their effects on the local environment in a selected area of Mosul, Iraq. The results will then be compared to international standards, evaluated to help develop methods for protecting people's health, and solutions to the issue will be offered.
ALi Ali, nabel Qasem, juhina ALI (Author)
March 2023 ,Pages 31.0-37.0
Abstract: The results of a field survey of some potato growing areas in Nineveh Governorate showed the presence of Potato virus s PVS, which was detected by the Double Antibody Sandwich Enzyme-Linked ImmunoSorbent Assay DAS-ELISA test. This record is the first in the governorate. Through the absorbance readings using the elisa reader, highest value was recorded in the Sherikhan area samples, which amounted to 1.190 nm, while lowest value was recorded in the Rabia area samples with a value of 0.756 nm, while absorbance value of the negative standard sample was 0.300 nm. The frequency of virus in the Sherikhan area was 53.3%, while frequency of the virus in the Rabia area was 28.8%. As a result of mechanical inoculation with virus isolates diagnosed by DAS-ELISA test, spread of the common strain PVSO through symptoms on Chenopodium quinoa, which was in the form of small chlorotic spots on the inoculated leaves, and new leaves were devoid of any disease symptoms.
Jwan Khairi khalil, Ammar Mahmood (Author)
March 2023 ,Pages 38.0-46.0
Abstract: In recent years, there has been an increase in interest in researching various (movements) on the e-abacus diagram in attempt to determine how these movements affect the origin of the design as a form of coding. In this paper we will submit an technique is used for the first time, but from one diagram we will get several diagrams, so that they do not resemble each other except in specific parts of the diagram, which makes finding the original seem almost impossible. It will start from the bottom left side exclusively for the diagram and then in a manner similar to slides from the top to the bottom, and from the bottom to the top, followed by the top left side exclusively for the diagram and in the direction up to the bottom and finally down to the top. By dividing the diagram into slides just from the left side of the diagram, we will provide four new types in this research and in the upper or lower directions LSUUL, LSULU, LSLUL and LSLLU.
Zainab Mohialdeen, Mushtaq Al-Jubbori (Author)
March 2023 ,Pages 47.0-55.0
Abstract: In this study, the bulk etch rate (VB) was measured by three different methods forCR-39 with a thickness of 200µm and an area of (1 × 1 cm2), where CR_39 was irradiated through from Am241source with energy of alpha particles is 2.6MeV and at an angle of fall perpendicular to the surface of the CR-39 detector, the detector etching with (NaOH) at a concentration of 6.25N and (70 ± 1°C) and showing the effects formed on the surface of the detector with time periods ranging from (0.25h) and the formed effects were photographed In the detector at different eching times using an optical microscope of the type (XSZ-H Series Biological Microscope) equipped with a digital camera of the type (MADC_5A) connected to a personal computer, in order to find the length, thickness and diameters of the track formed on the surface of the detector.VB determind by methods are: Removed thickness method, the second method, the saturation track method, and the diameter-length method (D_L method), as the first method does not require irradiation of the detector, but the other two methods require irradiation of the detector and measurement of lengths and diameters And the time of proving the effect, and we found that the values of VB rate for the three methods, the removed thickness method, the saturation track method, and the diameter-length of the effect ((D_L method) respectively are:, (1.206, 1.204, 1.271 (µm/h) and compare the results between the mentioned methods, as we found that they are close.
Noora Mohammed Jamil, Ali Abbas Mohammed Salih Al Agah (Author)
March 2023 ,Pages 56.0-70.0
Abstract: The electron distribution function for gallium arsenide GaAs was calculated by using the Boltzmann transition equation in the central valley , for a range of low fields relative to the threshold field (E0 = 5.95Kv/cm) (0.3-1)E0. To obtain the distribution function, the Boltzmann transport equation was solved using a mechanism that combines the analytical and numerical methods. Analytical method involving extension of the Legendre polynomial was used and the effect of polar optical scattering was introduced as the dominant scattering mechanism in this research, as well as the effect of an asymmetric energy band structure with spherical energy surfaces in the central valley. After obtaining a partial differential equation of the second order, it is solved numerically after separation process for the variables using the direct matrix method in energy space by building a mathematical program using MATLAB. In this study, a system with dimensions of 360 × 360 was built, and the rate of change in energy was taken as 0.001.The computational system was tested by applying low electric fields, and the distribution function that was obtained had a Maxwellian distribution at very low fields, and it shifted from the Maxwellian distribution at higher fields close to the threshold field, and the results obtained were agree with previous results. While this system did not give accurate results at the high-electric fields.
Hiba Muneer Yahya Al-shakarjy, Dujan Taha (Author)
March 2023 ,Pages 71.0-80.0
Abstract: The complexity of software has increased because of the development as well as the difficulty of requirements during the development of software, or to add new features that eventually lead to reduce the quality of the software as a whole. Software refactoring can be defined as included processes in the maintenance period of a software life cycle, and it is a technique to clean the software code from code bad smell and to improve the internal structure of the software, in addition to increasing the quality of software by using a set of activities without changing the external behavior of a software. Researchers have been developing techniques to reform software during the code or design standard to decrease the effort and time required for maintenance processes. This paper provides a systematic review of the literature for 17 studies of code standards, An automatic search is utilized in the digital libraries to look for the relevant studies that were published from 2014 to 2021, the best five researchers are chosen in this subject, five studies or less are chosen for each depending on the number of reference in the database of scientific sites, or using an approach or a new method to get good results. Eventually, each paragraph is analyzed and mentions the method or algorithm used in rebuilding software, further the aims, and the result for each paper.
Israa sheekhoo, Azzam Aladool (Author)
March 2023 ,Pages 81.0-90.0
Abstract: Several scientific and engineering applications are usually described as integral equations. A new approach for solving the type of linear and nonlinear Fredholm integral equation of the second kind is proposed. Although many methods provide an analytic solution, there are different types of integral equations are difficult to solve. Therefore, the numerical approach for solving integral equations is used. Fredholm integral equations of the second kind have been converted to unconstrained optimization problems to find their approximate solutions. This work employs particle swarm optimization combined with padé expansion to find an approximate solution of the Fredholm integral equation. This is applied by minimizing the fitness function value. The fitness function is calculated using the discrete least squares weighted function. The proposed algorithm is applied to solve linear and non-linear FIE. The results are compared to exact solutions. The stability of the proposed algorithm is also presented. The results are promising in terms of convergence , stability and accuracy of the approximate solution.
Younis Younis, Israa Alhamdani (Author)
March 2023 ,Pages 91.0-108.0
Abstract: The six upper front teeth determine the appearance of Aesthetic dentistry. The study will define lateral incisors based on their lower angles as round, square, or square/round. LORIN molds to shape teeth were utilized. It extracted 144 teeth images from him and used 36 photographs of denture lateral incisors. The aim of the proposed work is to develop a model capable of determining the most likely form the teeth will take. Intelligent systems first distinguish denture picture edges and separate gums from teeth. After early processing teeth were extracted. and use morphological methods performed to remove the hump, and The Savitzky-Golay filter then softens the corners. Images were tested to determine their type. Fuzzy logic determines the filter's mask size by finding the most matching teeth. we were cropped 50%, 66%, and 75% of the teeth and compared the rest lower parts of the teeth. Then, each type of tooth is matched using Pearson's correlation coefficient and LORIN-certified dental molds. When evaluating pictures of lateral incisor teeth, researchers found 36.1% accuracy when using the entire tooth, and 66.1% accuracy when cropping 75% of the tooth. The best match and discrimination of the lateral incisor were at cropping 50% and 66%, his accuracy was 86.1%. This study's results were compared to previous research on this subject, demonstrating their reliability and precision.
Karam Mohammed Salih, Najla Dabagh (Author)
March 2023 ,Pages 109.0-124.0
Abstract: Abstract Digital forensics is a process of collection, identification, extraction, and documentation of electronic evidence which is used in a court of law. There are a large number of tools that help us to make this process easy and simple. In this paper, four tools have been chosen to explore and study. The best digital forensic tools have been chosen according to different parameters in each type of digital forensics. The (Stellar) basis tool and (Forensic Tool Kit) have been explored for computer forensic tools while (Network Map) has been chosen for network forensic tools and (OSFmount) has been studied as a live forensic tool. This paper also covers other types of forensic tools like Database forensic tools, O.S. forensic tools, and Mail forensic tools. The role of Artificial intelligence in Digital Forensic tools has been discussed in this paper by using both Decision Stump and Bayes net machine learning techniques. After making an investigation of the IoT device traffic dataset using these two techniques, Decision Stump gives us less accurate results compared with Bayes net.