An analytical model in the form of a hyperbolic function has been suggested for the axial potential distribution of an electrostatic einzel lens. With the aid of this hyperbolic model the relative optical parameters have been computed and investigated in detail as a function of the electrodes voltage ratio for various trajectories of an accelerated charged-particles beam. The electrodes voltage ratio covered a wide range where the lens may be operated at accelerating and decelerating modes. The results have shown that the proposed hyperbolic field has the advantages of producing low aberrations under various magnification conditions and operational modes. The electrodes profile and their three-dimensional diagram have been determined which showed the possibility of being practically realized.
DBN Rashid, International Journal of English Linguistics, 2019 - Cited by 2
The aim of the research was to prepare the fields and items for safe environment scale form professional basketball players and coaches’ point of view. The researchers used the descriptive method on professional athletes of players and coaches from (11) clubs; for the pilot study (21) athletes were selected and for the building sample (103) athletes, and standardization sample (101) athletes from the participants in the Iraqi league (2018-2019). The scale of the safe environment was concluded with (6) fields and (52) items. The researchers came up with the safe environment scale from the point of view of professional basketball players and coaches. Finally the researchers recommended paying attention to providing safe environment for athl
... Show MoreKinematics is the mechanics branch which dealswith the movement of the bodies without taking the force into account. In robots, the forward kinematics and inverse kinematics are important in determining the position and orientation of the end-effector to perform multi-tasks. This paper presented the inverse kinematics analysis for a 5 DOF robotic arm using the robotics toolbox of MATLAB and the Denavit-Hartenberg (D-H) parameters were used to represent the links and joints of the robotic arm. A geometric approach was used in the inverse kinematics solution to determine the joints angles of the robotic arm and the path of the robotic arm was divided into successive lines to accomplish the required tasks of the robotic arm.Therefore, this
... Show MoreMannich base is a versatile compound that can be easily modified to introduce different functional groups, allowing for the creation diverse selection of items with varying features. Additionally, the Mannich reaction is a valuable tool in organic synthesis, due to the fact it provides an effortless and efficient approach for synthesizing C-N bonds. Overall, The Mannich base and even its derivatives are essential in many aspects of chemistry and its complexes are in the pharmaceutical industry. Studies have revealed that it shows good anti-cancer, anti-mycobacterial, remarkable anti-HIV, anti-tubercular, anti-convulsant, anti-fungal, antiviral, antitumor, cytotoxic activities and in industrial applications such as in the creation of polymer
... Show MoreBackground There is an increasing need for pharmacists to incorporate more patient care targeting. Consequently, the productivity of pharmacy programs can be enhanced by evaluating the advantages and disadvantages of pharmacy curriculum. Objectives To assess the beliefs, perceptions, and challenges of the College of Pharmacy –The University of Baghdad PharmD graduates regarding the PharmD program. Method Qualitative research methodology was implemented. Graduate PharmD candidates were interviewed either inperson or via telephone. The interviews were conducted in a semi-structured format, utilizing a predetermined interview guide that included open-ended questions. Thematic analysis was implemented to analyze the data. Results A total of 2
... Show MoreIsatin is a heterocyclic molecule that belongs to one of the most important classes of organic compounds known as indolines. Isatin, isatin analogs, and their Schiff bases have recently attracted a lot of attention in medicinal chemistry. Isatin, itself, shows various biological activities such as antiviral, anticancer, antimicrobial, anti-inflammatory, analgesic, antioxidant, and anticonvulsant. Bis- Schiff bases containing isatin moiety have been known to possess a wide spectrum of pharmacological activities. This review offers up-to-date information on the most active isatin bis-Schiff bases, which would include anticancer, antimicrobial, antiviral, anticonvulsant, anti-inflammatory, and analgesic activities. These observations c
... Show MoreABSTRACT : Alzheimer’s disease (AD) is one of the most common inflammatory neurodegenerative diseases linked with dementia, it is characterized by the deposition of amyloid beta-peptide (Ab) in the brain. The present study aims to innovate a biochemical relationship between AD and interleukin 38 (IL-38) as an anti-inflammatory cytokine, expose novel mechanisms and concepts regarding other biochemical parameters studied previously or recently in AD patients and also examine the biochemical action of memantine (10 mg daily) on AD patients. Sixty (60) diagnosed AD patients participated in the present study and classified into four (4) groups: G3 were composed of (15) newly diagnosed males (52-78) years / without treatment, G4 composed of (15
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More