Preferred Language
Articles
/
bsj-4682
A Comparison Between the Theoretical Cross Section Based on the Partial Level Density Formulae Calculated by the Exciton Model with the Experimental Data for (_79^197)Au nucleus
...Show More Authors

In this paper, the theoretical cross section in pre-equilibrium nuclear reaction has been studied for the reaction  at energy 22.4 MeV. Ericson’s formula of partial level density PLD and their corrections (William’s correction and spin correction) have been substituted  in the theoretical cross section and compared with the experimental data for  nucleus. It has been found that the theoretical cross section with one-component PLD from Ericson’s formula when  doesn’t agree with the experimental value and when . There is little agreement only at the high value of energy range with  the experimental cross section. The theoretical cross section that depends on the one-component William's formula and on-component corrected to spin PLD formula doesn't agree with the experimental cross section. But in case of theoretical cross section based on two-component Ericson's and William's PLD formulae it has been found that there is acceptable agreement when the exciton number is taken .

 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 09 2024
Journal Name
Engineering, Technology & Applied Science Research
Experimental Investigation of Composite Circular Encased GFRP I-Section Concrete Columns under Different Load Conditions
...Show More Authors

Pultruded materials made of Fiber-Reinforced Polymer (FRP) come in a broad range of shapes, such as bars, I-sections, C-sections, etc. FRP materials are starting to compete with steel as structural materials owing to their great resistance, low self-weight, and cheap maintenance costs, especially in corrosive conditions. This study aims to evaluate the effectiveness of a novel concrete Composite Column (CC) using Encased I-Section (EIS) as a reinforcement in contrast to traditional steel bars by using Glass Fiber-Reinforced Polymer (GFRP) as I-section (CC-EIS) to evaluate the effectiveness of the hybrid columns which have been built by combining GFRP profiles with concrete columns. To achieve the aims of this study, nine circular co

... Show More
View Publication
Scopus (5)
Crossref (8)
Scopus Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
"RUF procedures forgetting the best subset linear regression model"
...Show More Authors

The purpose behind building the linear regression model is to describe the real linear relation between any explanatory variable in the model and the dependent one, on the basis of the fact that the dependent variable is a linear function of the explanatory variables and one can use it for prediction and control. This purpose does not cometrue without getting significant, stable and reasonable estimatros for the parameters of the model, specifically regression-coefficients. The researcher found that "RUF" the criterian that he had suggested accurate and sufficient to accomplish that purpose when multicollinearity exists provided that the adequate model that satisfies the standard assumpitions of the error-term can be assigned. It

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Analytical Study Compared Between Poisson and Poisson Hierarchical Model and Applied in Healthy Field
...Show More Authors

Through this research, We have tried to evaluate the health programs and their effectiveness in improving the health situation through a study of the health institutions reality in Baghdad to identify the main reasons that affect the increase in maternal mortality by using two regression models, "Poisson's Regression Model" and "Hierarchical Poisson's Regression Model". And the study of that indicator (deaths) was through a comparison between the estimation methods of the used models. The "Maximum Likelihood" method was used to estimate the "Poisson's Regression Model"; whereas the "Full Maximum Likelihood" method were used for the "Hierarchical Poisson's Regression Model

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 17 2014
Journal Name
Microbial Ecology
Investigating the Link Between Imipenem Resistance and Biofilm Formation by Pseudomonas aeruginosa
...Show More Authors

Pseudomonas aeruginosa, a ubiquitous environmental organism, is a difficult-to-treat opportunistic pathogen due to its broad-spectrum antibiotic resistance and its ability to form biofilms. In this study, we investigate the link between resistance to a clinically important antibiotic, imipenem, and biofilm formation. First, we observed that the laboratory strain P. aeruginosa PAO1 carrying a mutation in the oprD gene, which confers resistance to imipenem, showed a modest reduction in biofilm formation.We also observed an inverse relationship between imipenem resistance and biofilm formation for imipenem-resistant strains selected in vitro, as well as for clinical isolates.We identified two clinical isolates of P. aeruginosa from the sputum

... Show More
View Publication
Scopus (30)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Tue May 06 2025
Journal Name
Aip Conference Proceedings
Enhance the performance of the wind turbine blade based on the blade element momentum theory
...Show More Authors

In order to improve the effectiveness, increase the life cycle, and avoid the blade structural failure of wind turbines, the blades need to be perfectly designed. Knowing the flow angle and the geometric characteristics of the blade is necessary to calculate the values of the induction factors (axial and tangential), which are the basis of the Blade Element Momentum theory (BEM). The aforementioned equations form an implicit and nonlinear system. Consequently, a straightforward iterative solution process can be used to solve this problem. A theoretical study of the aerodynamic performance of a horizontal-axis wind turbine blade was introduced using the BEM. The main objective of the current work is to examine the wind turbine blade’s perf

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Population Density and Susceptibility of Some Varieties of Potato to Infested by Aphid and Thrips on Spring Plantation in the Middle of Iraq
...Show More Authors

Aphid Aphis spp (Hemiptera:Aphididae) and Thrips Thrips spp (Thysanoptera: Thripidae) an economically important pests on several crops in the world and Iraq, that transfer many viruses diseases to it. Field studies were conducted to assessment the population density of these insects and susceptibility of six varieties (Barin, Revera, Divela, Rudlph, Alazata and Pleny) to infestation during 2013 spring season. The results were showed that all Potato varieties were infested by Aphis and Thrips on spring plantation but with different percentage. The Divela variety was higher percentage of infestation and high population density of aphid which averaged 1.47 insect/ leaf while in Alazata was the lower population density which averaged 1.02 in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Bionatura
Study of the Effect of Diabetes Mellitus I on Bone Mineral Density of Upper and Lower Limbs by Dual-Energy X-Ray Absorptiometry
...Show More Authors

Background: Bone mineral density (BMD) has been assessed using Dual-Energy X-ray absorptiometry (DEXA). This procedure is considered to be of vital importance in assessing the general condition of individuals concerning their skeletal mineralization. BMD is measured according to the results of the DEXA examination of the vertebral column and pelvis. Although diabetes mellitus (D.M.)is known to affect BMD, the information regarding this relationship is not currently particularly clear. Objective: This study concentrates on the point that the assessment of BMD for the vertebral column is insuffi-cient to give a realistic and correct picture of the mineralization of the remaining part of the skeleton. Besides, this study elicited a gen

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref