Preferred Language
Articles
/
AxYRuYcBVTCNdQwCEV8k
The substitutions of Strontium by yttrium and their effects on Bi<sub>2</sub>Sr<sub>2</sub>-<sub>x</sub>Y<sub>x</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10</sub>+<sub>δ</sub> superconducting compound
...Show More Authors
Abstract<p>Superconducting compound Bi<sub>2</sub>Sr2-<sub>x</sub>Y<sub>x</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10+δ</sub> were Synthesized by method of solid state reaction, at 1033 K for 160 hours temperature of the sintering at normal atmospheric pressure where substitutions Yttrium oxide with Strontium. When Y2O3 concentration (0.0, 0.1, 0.2, 0.3, 0.4 and 0.5). All specimens of Bi<sub>2</sub>Sr<sub>2</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10+δ</sub> superconducting compounds were examined. The resistivity of electrical was checked by the four point probe technique, It was found that the optimum and maximum transition temperature T<sub>c</sub> = 125°K. The crystal structure studied by using XRD analysis and it was showed that the all specimens have tetragonal structures. Bi-2223phase increase by increasing Y<sub>2</sub>O<sub>3</sub> concentration up x=0.4, The increasing addition Yttrium oxide concentration produce increasing in high-phase (Bi-2223) and c lattice parameter.</p>
Scopus Crossref
View Publication
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
Message in detail what was said in the parents of the Prophet  Ibn Kamal Pasha (d. 940 e) study and investigation
...Show More Authors

After Hamdallah and his success on the realization of this manuscript (a letter in detail what was said in the parents of the Prophet  Ibn Kamal Pasha (d. 940 e) study and investigation I will review some of the results reached in the realization of this manuscript:
1. The hadiths mentioned in this manuscript are mostly placed or weak.
2 - We are not entitled to speak about the silence of the law for saying Almighty ﭽ ﮮ ﮯ ﮰ ﮱ ﯓ ﯔ ﯕ ﯖ ﯗ ﯘ ﯙ ﭼ Table: 101.
3 in which harm to our Holy Prophet  وله تع ﮂ ﮃ ﮄ ﮅ ﮆ ﮈ ﮉ ﮊ ﮋ ﮌ ﮍ ﮎ ﭼ parties: 57.
4 Because the parents of the Prophet  of the people of the period ordered them to God for the Almighty ﭽ ﯨ ﯩ ﯪ ﯫ ﯬ

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Gene Reports
The molecular study for evaluation the antibiotic resistance of Escherichia coli and Klebsiella pneumoniae bacteria isolated from urinary tract infection patients
...Show More Authors

Urinary tract infection is a bacterial infection that often affects the bladder and thus the urinary system. E. coli is one of the leading uropathogenic bacteria that cause urinary tract infections. Uropathogenic E. coli is highly effective and successful in causing urinary tract infections through biofilm formation and urothelial cell invasion mechanisms. Other organisms that cause urinary tract infections include members of the Enterobacteriaceae family, streptococci and staphylococci species and perch. In addition, K.penumoniae is another important gram-negative bacterium that causes urinary tract infections. With the PCR technique, unseen bacterial species can be detected using standard clinical microbiology methods. In this study, the

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Iraqi Journal Of Physics
Study of the Nuclear Structure for 38Ar, 59Co, 124Sn, 146Nd, 153Eu and 203Tl Target Nuclei Used in Fabrication the Nuclear Batteries
...Show More Authors

The nuclear structure of 38Ar, 59Co, 124Sn, 146Nd, 153Eu and 203Tl target nuclei used in technology for nuclear batteries have been investigation, in order that, these nuclei are very interesting for radioisotope thermo-electric generator (RTG) space studies and for betavoltaic battery microelectronic systems. The single particle radial density distribution, the corresponding root mean square radii (rms), neutron skin thicknesses and binding energies have been investigated within the framework of Hartree-Fock Approximation with Skyrme interaction. The bremsstrahlung spectrums produced by absorption of beta particles in betavoltaic process and backscattered p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees22fr
Study the contrast of thermal expansion behavior for PMMA denture base, single and hybrid reinforced using the thermomechanical analysis technique (TMA)
...Show More Authors

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Fri Dec 02 2022
Journal Name
Nankai Business Review International
Evaluating the dimensions of strategic intent according to the Hamel and Prahalad model/a case study in Oil Projects SCOP Company
...Show More Authors
Purpose

The purpose of this study is to examine the dimensions of strategic intent (SI; see Appendix 1) according to the Hamel and Prahalad model as a building for the future, relying on today’s knowledge-based and proactive strategic directions of management as long-term and deep-perspective creative directions, objective vision and rational analysis, integrative in work, survival structure and comprehensiveness in perception.

Design/methodology/approach

The quantitative approach was used based on research, detection and proof, as data were collected from leader

... Show More
View Publication
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT
...Show More Authors

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Aug 17 2022
Journal Name
Aip Conference Proceedings
Remove phenolic pollutant on Bentonite surface nanopowder
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More