Preferred Language
Articles
/
Lxa61ocBVTCNdQwCn2rB
Theoretical Calculation of Photon Emission from Quark-Antiquark Annihilation Using QCD Theory
...Show More Authors

In this work, we calculate and analyze the photon emission from quark and anti-quark interaction during annihilation process using simple model depending on phenomenology of quantum chromodynamic theory (QCD). The parameters, which include the running strength coupling, temperature of the system and the critical temperature, carry information regarding photon emission and have a significant impact on the photons yield. The emission of photon from strange interaction with anti-strange is large sensitive to decreases or increases there running strength coupling. The photons emission increases with decreases running strength coupling and vice versa. We introduce the influence of critical temperature on the  photon emission  rate in order to facilitate its further applied in  photon emission spectrum. Photon emission was increased with large critical temperature MeV comparing with photons emission at critical temperature MeV. We analyze and discuss the sensitive of the emission of photon to photons energy . It increases with decreased photons energy and vice versa. However, the photons emission increases with increases thermal energy of system T = 170 MeV to 270 Mev. It is implied that strength coupling, critical temperature and photons energy  can be as important as thermal energy of  system   for emission of  photon.

Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Optimum conditions for ascorbic acid determination in three Iraqi citrus using HPLC technique
...Show More Authors

A high-performance liquid chromatography method was employed for the quantitative determination of ascorbic acid (AA) which called vitamin C in three types of Iraqi citrus (orange mandarin and aurantium ) and to establish this goal , evaluation of ascorbic acid degradation is so important due to its significant criticality when exposure to ordinary atmospheric conditions. The chromatographic analysis of AA was carried out after their sequential elution with KH2PO4 ( as mobile phase) by reverse-phase HPLC technique with C8 column and UV detection at 214 nm. .Bad resolutions was appeared clearly for C8 column , so another alternative condition were carried out to improve the resolution by replacement of C8 by C18 column .Statistical treat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Wireless Propagation Multipaths using Spectral Clustering and Three-Constraint Affinity Matrix Spectral Clustering
...Show More Authors

This study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2009
Journal Name
Tencon 2009 - 2009 Ieee Region 10 Conference
Optimizing the MPLS support for real time IPv6-Flows using MPLS-PHS approach
...Show More Authors

View Publication
Scopus (4)
Scopus Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Probabilistic Model building using the Transformation Entropy for the Burr type –xii Distribution
...Show More Authors

Entropy define as uncertainty measure has been transfared by using the cumulative distribution function and reliability function for the Burr type – xii. In the case of data which suffer from volatility to build a model the probability distribution on every failure of a sample after achieving limitations function, probabilistic distribution. Has been derived formula probability distribution of the new transfer application entropy on the probability distribution of continuous Burr Type-XII and tested a new function and found that it achieved the conditions function probability, been derived mean and function probabilistic aggregate in order to be approved in the generation of data for the purpose of implementation of simulation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
International Journal Of Ambient Energy
Energy generation by membraneless microfluidic fuel cell using acidic wastewater as a fuel
...Show More Authors

A simple and novel membraneless paper-based microfluidic fuel cell was presented in this study. The occurrence of laminar flow was employed to ensure no mixing of the fuel and oxidant fluids along the bath of reaction. The acidic wastewater was used as a fuel. It was an air-breathing cell, so air and tab water were used as oxidants. Both the fuel and tab water flowed continuously under gravity. Whatman filter paper was used for preparation of the fuel cell channel and two carbon fibre electrodes were used and firmed on the edges of the cell. The performance of the cell was examined over three consecutive days. The results indicated that the present cell has the potential to generate electric power, but an extensive study is required to harv

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Mar 24 2009
Journal Name
كتاب الوقائع /المؤتمر العلمي الثالث لكلية العلوم جامعة بغداد
Using antibiotics as mutagenic and curing agents for Prodigiosin Production By Serratia marcescens
...Show More Authors

The effect of different antibiotics on growth pigment and plasmid curing of Serratia marcescens were studied, S. marcescens was cultured in media containing(16_500)µg/ml of antibiotics, curing mutants unable to produce prodigiosin and lost one plasmid band were obtained of of ampicillin, amoxillin, antibiotics concentrations (64 500) µg/ml metheprim, ultracloxam, azithromycin, cephalexin and erythromycin treated with (350 500) µg/ml of The mutant cells rose- light color and and refampicin revealed S.marcescens inhibited ciprodar and tetracyclin, lincomycin did not lost the plasmid band chlaforan

Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Robot Arm Path Planning Using Modified Particle Swarm Optimization based on D* algorithm
...Show More Authors

Abstract

Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Clinical Plasma Medicine
Breast cancer treatment using cold atmospheric plasma generated by the FE-DBD scheme
...Show More Authors

Background Cold atmospheric plasma (CAP) is widely used in the cancer therapy field. This type of plasma is very close to room temperature. This paper illustrates the effects of CAP on breast cancer tissues both in vivo and in vitro. Methods The mouse mammary adenocarcinoma cell line AN3 was used for the in vivo study, and the MCF7, AMJ13, AMN3, and HBL cell lines were used for the in vitro study. A floating electrode-dielectric barrier discharge (FE-DBD) system was used. The cold plasma produced by the device was tested against breast cancer cells. Results The induced cytotoxicity percentages were 61.7%, 68% and 58.07% for the MCF7, AMN3, and AMJ13 cell lines, respectively, whereas the normal breast tissue HBL cell line exhibited very li

... Show More
View Publication
Scopus (61)
Crossref (48)
Scopus Clarivate Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Engineering
Strengthening and Closing Cracks for Existing reinforced Concrete Girders Using External Post-Tensioning
...Show More Authors