The δ-mixing ratios have been calculated for several γ-transitions in 90Mo using the 𝛔 𝐉 method. The results are compared with other references the agreement is found to be very good .this confirms the validity of the 𝛔 𝐉 method as a tool for analyzing the angular distribution of γ-ray. Key word: population parameter, γ-ray transition, 𝛔 𝐉 method, multiple mixing ratios.
In this research we prepared CdS thin films by Spray pyrolysis method on a glass substrates and we study its structural , optical , electrical properties .The result of (X-Ray ) diffraction showed that all thin films have a polycrystalline structure , The relation of the transmission as a function of wavelength for the CdS films had been studied , The investigated of direct energy gap of the CdS its value is (2.83 eV). In Hall effect measurement of the CdS we find the charge carriers is p – type and Hall coefficient 1157.33(cm3/c) ,Hall mobility 6.77(cm2/v.s)
In this research Bi2S3 thin films have been prepared on glass substrates using chemical spray pyrolysis method at substrate temperature (300oC) and molarity (0.015) mol. Structural and optical properties of the thin films above have been studied; XRD analysis demonstrated that the Bi2S3 films are polycrystalline with (031) orientation and with Orthorhombic structure. The optical properties were studied using the spectral of the absorbance and transmission of films in wavelength ranging (300-1100) nm. The study showed that the films have high transmission within the range of the visible spectrum. Also absorption coefficient, extinction coefficient and the optical energy gap (Eg) was calculated, found that the film have direct ener
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates
... Show MoreThe downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ r
... Show MoreIn this paper, we investigate the automatic recognition of emotion in text. We perform experiments with a new method of classification based on the PPM character-based text compression scheme. These experiments involve both coarse-grained classification (whether a text is emotional or not) and also fine-grained classification such as recognising Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method significantly outperforms the traditional word-based text classification methods. The results show that the PPM compression based classification method is able to distinguish between emotional and nonemotional text with high accuracy, between texts invo
... Show MoreCarbon dioxide geo-sequestration (CGS) into sediments in the form of (gas) hydrates is one proposed method for reducing anthropogenic carbon dioxide emissions to the atmosphere and, thus reducing global warming and climate change. However, there is a serious lack of understanding of how such CO2 hydrate forms and exists in sediments. We thus imaged CO2 hydrate distribution in sandstone, and investigated the hydrate morphology and cluster characteristics via x-ray micro-computed tomography in 3D in-situ. A substantial amount of gas hydrate (∼17% saturation) was observed, and the stochastically distributed hydrate clusters followed power-law relations with respect to their size distributions and surface area-volume relationships. The layer-
... Show MoreThe paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)