In this study, the Halder-Wagner method was used for an analysisX-ray lines of Tio2 nanoparticles. Where the software was used to calculate the FWHM and integral breath (β) to calculate the area under the curve for each of the lines of diffraction. After that, the general equation of the halder- Wagner method is applied to calculate the volume (D), strain (ε), stress (σ), and energy per unit(u). Volume (β). Where the value of the crystal volume was equal to (0.16149870 nm) and the strain was equal to (1.044126), stress (181.678 N / m2), and energy per unit volume (94.8474 J m-3).The results obtained from these methods were then compared with those obtained from each of the new paradigm of the HalderWagner method, the Shearer development method, and the Munshi-Shearer method, and their results for new the Halder - Wagner method crystal volume model (0.16487774nm), strain (1.28564), retinal stress (223.7021 N / m2), energy per unit volume (109.333 J m-3) and for Munshi-Shearer crystal volume (0.14985728 nm) , and the development of Shearer retinal stress (162.0636 N / m2) and strain (0.9314), energy per unit volume (75.473 J m-3).
In this research, beam expander, BEX, is explained and designed for illuminating the
remote flying target. The BEX is optically designed to be suited for Nd:YAG laser of given
specifications. The BEX is modified to be zoom one to meet the conditions of preventing the
receiving unit; i.e the photodetector, from getting saturated at near and far laser tracking.
Decollimation could be achieved by automatic motor, which controls zoom lens of the BEX
according to the required expansion ratio of beam expander
Background: Lateral sinus augmentation and simultaneous insertion of dental implants is a highlypredictable procedure and associated with high rate of implants success.Aims: To evaluate implant stability changes following maxillary sinus augmentation utilizing deproteinizedbovine bone alone or mixed with platelet-rich fibrin.Materials and Methods: A total of 34 lateral sinus augmentation procedures were performed and 50 dentalimplants simultaneously installed. The lateral sinus augmentation cases were allocated randomly into 3groups: Group A comprised 13 procedures and 21 dental implants utilizing solely deproteinized bovine bone.Group B involved 10 cases and 16 dental implants using deproteinized bovine bone mixed with leukocyteand
... Show MoreThe air flow pattern in a co-current pilot plant spray dryer fitted with a rotary disk atomizer was determined experimentally and modelled numerically using Computational Fluid Dynamics (CFD) (ANSYS Fluent ) software. The CFD simulation used a three dimensions system, Reynolds-Average Navier-Stokes equations (RANS), closed via the RNG k −ε turbulence model. Measurements were carried out at a rotation of the atomizer (3000 rpm) and when there is no rotation using a drying air at 25 oC and air velocity at the inlet of 5 m/s without swirl. The air flow pattern was predicted experimentally using cotton tufts and digital anemometer. The CFD simulation predicted a downward central flowing air core surrounded by a slow
... Show MoreThe theme of this Study presents analysis and discuss to the "Share the framework for assessing inflation," a practical study in a sample of joint stock companies listed on the Iraq Stock Exchange for the years (2009-2013). To determine the extent of the disparity between the nominal value of shares (Nominal Value) before deducting inflation and the real value (Real Value) per share, after deducting inflation in the case of zero growth. The study relied on annual reports of the companies of the research sample of the Iraq Stock Exchange, as well as the Iraqi Securities Commission. Besides the annual reports issued by the Ministry of Planning, as well as annual reports and statistical bulletin issued by the Central Bank of Iraq. It is fra
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreAn anatomical study was carried out at the College of Agricultural Engineering Sciences, University of Baghdad, in 2017, on lupine crop (Lupinus albus) as a comparison guide of three seed weights of three lupine cultivars viz. ‘Giza-1’, ‘Giza-2’ and ‘Hamburg’. The nested design was used with four replications. The results showed that cultivars had a significant effect on stem anatomical traits. ‘Hamburg’ cultivar recorded the highest stem diameter, cortex thickness and xylem vascular diameter, while cultivar ‘Giza-1’ recorded the lowest values for the same traits as well as the highest collenchyma layer thickness, vascular bundle thickness, and xylem thickness. Cultivar ‘Giza-2’ recorded the lowest vascular b
... Show MoreThis study is the first investigation in Iraq dealing with genotyping of