Preferred Language
Articles
/
iRenjJABVTCNdQwCwIwp
Elimination of the broadening in X-ray diffraction lines profile for nanoparticles by using the analysis of diffraction lines method
...Show More Authors

In this research, the results of the Integral breadth method were used to analyze the X-ray lines to determine the crystallite size and lattice strain of the zirconium oxide nanoparticles and the value of the crystal size was equal to (8.2nm) and the lattice strain (0.001955), and then the results were compared with three other methods, which are the Scherer and Scherer dynamical diffraction theory and two formulas of the Scherer and Wilson method.the results were as followsScherer crystallite size(7.4nm)and lattice strain(0.011968),Schererdynamic method crystallite size(7.5 nm),Scherrer and Wilson methodcrystallite size( 8.5nm) and lattice strain( 0.001919).And using another formula for Schearer and Wilson methodwe obtain the size of the crystal(8.9nm). The difference in the results calculated for each of these methods was observed in this study.

Scopus Crossref
View Publication
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
An Investigation into Heat Transfer Enhancement by Using Oscillating Fins
...Show More Authors

The present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More
Publication Date
Tue Dec 28 2021
Journal Name
2021 2nd Information Technology To Enhance E-learning And Other Application (it-ela)
Pedestrian and Objects Detection by Using Learning Complexity-Aware Cascades
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 07 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Thyroid Carcinoma Patients Correlated With Cytomegalovirus by using Insitu Hybridization
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Desalination And Water Treatment
Reducing endotoxin from dialysis water by using different disinfection processes
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 23 2025
Journal Name
Imam Ja'afar Al-sadiq University Journal Of Legal Studies
The legal framework for the protection of new plant varieties
...Show More Authors

TRIPS agreement was The first to apply protection by patents. However, this type of protection, which grants exclusive and monopoly rights to patent owners, came at the expense of developing countries which are considered rich in biodiversity and also at the expense of traditional and poor knowledge of modern technologies. The release of new plant varieties has led to the emergence of biopiracy and looting of the rights of developing countries without a license

View Publication
Publication Date
Thu Oct 01 2020
Journal Name
Palarch's Journal Of Archaeology Of Egypt / Egyptology
THE JUDICAL BASIS FOR THE BRANCHING OUT OF CONSTITUTIONAL RIGHT
...Show More Authors

The bifurcation of the constitutional rights of one of the techniques used by the constitutional court to expand the scope of the constitutional right to explicit, and access to the fact that guarantees constitutional rights, and establishes the constitutional elimination of this technique on a particular bond is the constitutional terms of reference, and in the light of his discretion in the exercise of the constitutional powers of , and tends at times To the adoption of a broad branching approach, which confers on the constitutional text containing constitutional rights a wider scope than the scope of an explicit right.

View Publication
Publication Date
Sun Sep 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Potato Starch for Enhancing the Properties of the Drilling Fluids
...Show More Authors

Different additives are used in drilling fluids when the demanded properties cannot be gotten with clays. Drilling muds needs several additives and materials to give good characteristics. There are local alternatives more suitable for enhancing the rheology and filtration of drilling fluids. An experimental work had been conducted to assess the suitability of using potato starch to enhance rheological properties and filtration in drilling mud. This study investigated the potato starch as a viscosifier and fluid losses agent in drilling fluid. Results from this study proved that rheological properties of potato starch mud increased when pH of drilling fluid is increased.  Potato starch could be used to enhance gel strength at low pH

... Show More
View Publication Preview PDF
Crossref (7)
Crossref