Preferred Language
Articles
/
CBj5f5cBVTCNdQwClpkc
Searching Ground State Properties of some Light Proton-Rich Nuclei Using Whittaker Wave Functions
...Show More Authors
Abstract<p>In this work, the Whittaker wave functions were used to study the nuclear density distributions and elastic electron scattering charge form factors for proton-rich nuclei and their corresponding stable nuclei (<sup>10,8</sup>B, <sup>13,9</sup>C, <sup>14,12</sup>N and <sup>19,17</sup>F). The parameters of Whittaker’s basis were fixed to generate the experimental values of available size radii. The Whittaker basis was connected to harmonic-oscillator basis through boundary condition at match point. The nuclear shell model was opted with pure configuration for all studied nuclei to compute aforementioned studied quantities except <sup>10</sup>B. For <sup>10</sup>B, the total spin is 3<sup>+</sup>, therefore, there is a C2 component in empirical Coulomb form factor in addition to C0 component. The theory of core-polarization was applied to account such C2 contribution using Tassie, Bohr-Mottelson and valence models. The contribution of model space to C2 component was computed using Cohen-Kurath interaction. For exotic <sup>8</sup>B, <sup>9</sup>C, <sup>12</sup>N and <sup>17</sup>F nuclei, the Whittaker’s basis was applied only to the last exotic valence proton, on contrary to stable <sup>10</sup>B, <sup>13</sup>C, <sup>14</sup>N and <sup>19</sup>F which the Whittaker’s basis was applied to both last stable valence proton and neutron . It was seen that such treatment highly improved the calculated quantities in comparison with empirical data.</p>
Scopus Crossref
View Publication
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of the Dominions of Mindfulness on the Organizational Innovation “Descriptive analytical study in some faculties of the University of Baghdad”
...Show More Authors

Research seeks to test the impact of the dimensions of mindfulness on  organizational Innovation, proposed in the light of the review literature on two variables of the research, which referred in General to the dynamic relationship between them, as result of weakness of mindfulness as one important factor driving the diversity of innovation and time, ways to sustain and preserve and then support innovations made by creators, weakness in the overall level of organizational Innovation, this represents the problem research, data collection over designing   identification, distributed to sample Formed from (30) head Department at a number of colleges of the University of Baghdad, results confirms the validity of resea

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Using Neural Network with Speaker Applications
...Show More Authors

In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Reinforce organizational communication using Information Technology
...Show More Authors
Abstract<p>The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Using LiF Disc in Thermoluminescence Dosimetry
...Show More Authors

A LiF (TLD-700) PTFED disc has adiameter of (13mm) and thickness of (0.4mm) for study the response and sensetivity of this material for gamma and beta rays by using (TOLEDO) system from pitman company. In order to calibrate the system and studying the calibration factor. Discs were irradiated for Gamma and Beta rays and comparing with the theoretical doses. The exposure range is between 15×10-2 mGy to 1000×10-2 mGy. These doses are within the range of normal radiation field for workers.

View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Attacking Jacobian Problem Using Resultant Theory
...Show More Authors

     This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type:  ,            and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Jan 23 2016
Journal Name
Computer Science &amp; Information Technology ( Cs &amp; It )
Modelling Dynamic Patterns Using Mobile Data
...Show More Authors

View Publication
Crossref