The partial level density PLD of pre-equilibrium reactions that are described by Ericson’s formula has been studied using different formulae of single particle level density . The parameter was used from the equidistant spacing model (ESM) model and the non- equidistant spacing model (non-ESM) and another formula of are derived from the relation between and level density parameter . The formulae used to derive are the Roher formula, Egidy formula, Yukawa formula, and Thomas –Fermi formula. The partial level density results that depend on from the Thomas-Fermi formula show a good agreement with the experimental data.
Lead selenide PbSe thin films of different thicknesses (300, 500, and 700 nm) were deposited under vacuum using thermal evaporation method on glass substrates. X-ray diffraction measurements showed that increasing of thickness lead to well crystallize the prepared samples, such that the crystallite size increases while the dislocation density decreases with thickness increasing. A.C conductivity, dielectric constants, and loss tangent are studied as function to thickness, frequency (10kHz-10MHz) and temperatures (293K-493K). The conductivity measurements confirm confirmed that hopping is the mechanism responsible for the conduction process. Increasing of thickness decreases the thermal activation energy estimated from Arhinus equation is
... Show MoreAs a result of the increase in wireless applications, this led to a spectrum problem, which was often a significant restriction. However, a wide bandwidth (more than two-thirds of the available) remains wasted due to inappropriate usage. As a consequence, the quality of the service of the system was impacted. This problem was resolved by using cognitive radio that provides opportunistic sharing or utilization of the spectrum. This paper analyzes the performance of the cognitive radio spectrum sensing algorithm for the energy detector, which implemented by using a MATLAB Mfile version (2018b). The signal to noise ratio SNR vs. Pd probability of detection for OFDM and SNR vs. BER with CP cyclic prefix with energy dete
... Show MoreIn the present investigation, 24 adult dipteran species with forensic importance belonging to 13 genera and 8 families that were collected from different localities of Iraq. The specimens were identified by different taxonomical keys; in addition the date and localities of collecting specimens were recorded.
Laser cleaning of materials’ surfaces implies the removal of deposited pollutants without affecting the material. Nanosecond Nd:YAG pulsed laser, operating at 1064 nm and 532nm, was utilized. Different laser intensities and number of pulses were used on metallic and non-metallic surfaces under O2 and Ar environments to remove metal oxide and crust. Cleaning efficiency was studied by optical microscope. The results indicated the superiority of 1064 nm over the 532 nm wavelength without any detectable damage to materials’ surfaces. Marble cleaned in Oxygen gas environment was better than in Ar gas.
Euphemism is an important linguistic phenomenon that tends to soften written or oral expressions. Thus, when translators or interpreters face expressions including euphemism, they need to know how to deal with them. The problem of the current paper lies in the effect of rendering euphemistic expressions inaccurately, as such expressions represent the cultural and terminological sense of the original language. Thus, rendering them improperly will affect the sense of the interpreted speech. For this, it is essential for translators in general and simultaneous interpreters in particular to know the importance of utilizing euphemism in the simultaneous interpreting field, which is the main aim of this paper. To this end, a systematic review
... Show MoreI have studied the relationship between blood groups in humans and disease Cutaneous injury for the first time in Iraq study showed the presence of a significant statistical relationship between them leather Bmsoy in hospitals in Baghdad and its suburbs
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreAbstract This paper is devoted to introduce weak and strong forms of fibrewise fuzzy u-topological spaces, namely the fibrewise fuzzy q-u-topological spaces, weakly fibrewise fuzzy q-u-topological spaces and strongly fibrewise fuzzy q-utopological spaces. Also, Several characterizations and properties of this class are also given as well. Finally, we focused on studying the relationship between weakly fibrewise fuzzy q-u-topological spaces and strongly fibrewise fuzzy q-utopological spaces.