Preferred Language
Articles
/
bsj-2378
Studying the Electron Energy Distribution Function (EEDF) and Electron Transport Coefficients in SF6 – He Gas Mixtures by Solving the Boltzmann Equation
...Show More Authors

The Boltzmann equation has been solved using (EEDF) package for a pure sulfur hexafluoride (SF6) gas and its mixtures with buffer Helium (He) gas to study the electron energy distribution function EEDF and then the corresponding transport coefficients for various ratios of SF6 and the mixtures. The calculations are graphically represented and discussed for the sake of comparison between the various mixtures. It is found that the various SF6 – He content mixtures have a considerable effect on EEDF and the transport coefficients of the mixtures

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Radiation Research And Applied Sciences
Determination of muon absorption coefficients in heavy metal elements
...Show More Authors

View Publication
Crossref (2)
Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Studying the Microstructure of Al-Ti Alloy Prepared by Powder Metallurgy using Three Different Percentages of Ti
...Show More Authors

The effect of different Ti additions on the microstructure of Al-Ti alloy prepared by powder metallurgy was investigated. A certain amount of Ti (10wt%, 15wt%, and 20wt%) were added to aluminium and the tests like microhardness, density, scanning electron microscope (SEM), optical microscope (OM) and X-Ray Diffraction (XRD) were conducted to determine the influence of different Ti additives on the Al-Ti alloy properties and microstructure. The results show that the grains of α-Al changed from large grains to roughly spherical and then to small rounded grains with increasing Ti content, the micro-hardness of the alloy increases with increasing Ti, and XRD results confirm the formation of TiAl3 intermetallic co

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
System Identification Algorithm for Systems with Interval Coefficients
...Show More Authors

In this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Using He-Ne laser irradiation for enhancing cartilage Autografts
...Show More Authors

thirty adult NewZealand rabbits used in this study, they were divided in to two groups (control and treaded with Helium — Neon laser). A square skin flap done on the medial aspect of the auricle of both sides, a square piece of cartilage incised, pealed out from each auricle and fixed in the site of the other, then the flaps sutured .The site of the operation in the rabbits of the treated group were irradiated using a Helium —Neon laser with (5mw) power for (10 days) began after the operation directly, (3 rabbits) from each group used for collection of specimens for histopathological examination at the weeks (1,2,3,4, & 6) weeks post the operation .The results revealed Early invasion of the matrix with elastic fibers which continue to t

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 03 2022
Journal Name
Italian Journal Of Pure And Applied Mathematics
The inverse exponential Rayleigh distribution and related concept
...Show More Authors

Publication Date
Fri Apr 21 2023
Journal Name
Aip Conference Proceedings
Efficient computational methods for solving the nonlinear initial and boundary value problems
...Show More Authors

In this paper, three approximate methods namely the Bernoulli, the Bernstein, and the shifted Legendre polynomials operational matrices are presented to solve two important nonlinear ordinary differential equations that appeared in engineering and applied science. The Riccati and the Darcy-Brinkman-Forchheimer moment equations are solved and the approximate solutions are obtained. The methods are summarized by converting the nonlinear differential equations into a nonlinear system of algebraic equations that is solved using Mathematica®12. The efficiency of these methods was investigated by calculating the root mean square error (RMS) and the maximum error remainder (𝑀𝐸𝑅n) and it was found that the accuracy increases with increasi

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Efficient computational methods for solving the nonlinear initial and boundary value problems
...Show More Authors

Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A new technique for solving fractional nonlinear equations by sumudu transform and adomian decomposition method
...Show More Authors

A novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solutio

... Show More