The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.
The residual limb within the prosthesis, is often subjected to tensile or fatigue stress with varying temperatures. The fatigue stress and temperatures difference which faced by amputee during his daily activities will produces an environmental media for growth of fungi and bacteria in addition to the damage that occurs in the prosthesis which minimizingthe life of the prosthetic limb and causing disconfirm feeling for the amputee.
In this paper, a mechanical and thermal properties of composite materials prosthetic socket made of different lamination for perlon/fiber glass/perlon, are calculated by using tesile test device under varying temperatures ( from 20oC to 60oC), also in this paper a device for measuring rotational bendin
... Show MoreLength of plasma generated by dc gas discharge under different vacuum pressures was studied experimentally. The cylindrical discharge tube of length 2m was evacuated under vacuum pressure range (0.1-0.5) mbar at constant external working dc voltage 1500V. It was found that the plasma length (L) increased exponentially with increasing of background vacuum air pressure. Empirical equation has been obtained between plasma length and gas pressure by using Logistic model of curve fitting. As vacuum pressure increases the plasma length increases due to collisions, ionizations, and diffusions of electrons and ions.
The present work aims to fabricate n-i-p forward perovskite solar cell (PSC) withئ structure (FTO/ compact TiO2/ compact TiO2/ MAPbI3 Perovskite/ hole transport layer/ Au). P3HT, CuI and Spiro-OMeTAD were used as hole transport layers. A nano film of 25 nm gold layer was deposited once between the electron transport layer and the perovskite layer, then between the hole transport layer and the perovskite layer. The performance of the forward-perovskite solar cell was studied. Also, the role of each electron transport layer and the hole transport layer in the perovskite solar cell was presented. The structural, morphological and electrical properties were studied with X-ray diffractometer, field emission s
... Show MoreCadmium sulphide CdS films with 200 nm have been prepared by thermal evaporation technique on glass substrate at substrate room temperature under vacuum of 10-5mbar.In this paper, the effect of Dielectric Barrier Discharge plasma on the optical properties of the CdS film. The prepared films were exposed to different time intervals (0, 3, 5, 8) min. For every sample, the Absorption A, absorption coefficient α , energy gap Eg ,extinction coefficient K and dielectric constant ε were studied. It is found that the energy gap were decreased with exposure time, and absorption , Absorption coefficient, refractive index, extinction coefficient, dielectric constant increased with time of exposure to the plasma. Our study conside
... Show MoreIn this paper a thin films of selenium was prepare on substrates of n-Si by evaporation in a vacuum technique with thickness about 0.5μm. And then an annealing process was done on samples at two temperature (100 and 200) C ° in a vacuum furnace (10-3 torr).
Some structural, optical and mechanical properties of prepared thin films were measured. Results showed that the prepared film was the crystallization, optical transmittance and micro hardness of the prepared thin films increased significantly after annealing.
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More