Preferred Language
Articles
/
ijl-16
Study of Laser Propagation Parameters in the Underdense Plasma Region Using a Two Dimensional Simulation Code
...Show More Authors

The propagation of laser beam in the underdense deuterium plasma has been studied via computer simulation using the fluid model. An appropriate computer code “HEATER” has been modified and is used for this purpose. The propagation is taken to be in a cylindrical symmetric medium. Different laser wavelengths (1 = 10.6 m, 2 = 1.06 m, and 3 = 0.53 m) with a Gaussian pulse type and 15 ns pulse widths have been considered. Absorption energy and laser flux have been calculated for different plasma and laser parameters. The absorbed laser energy showed maximum for  = 0.53 m. This high absorbitivity was inferred to the effect of the pondermotive force.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Innovation, Creativity And Change
The role of the forensic accountant in achieving the integration of accounting and legal performance
...Show More Authors

Scopus (2)
Scopus
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Graphic narrative and its semantic value in the designs of the incident of the Taff
...Show More Authors

View Publication
Crossref
Publication Date
Tue May 12 2009
Journal Name
World Environmental And Water Resources Congress 2009
Modeling the Evolution of Incised Streams in Hammar Mesopotomian Marsh with Emphasis on the Contribution of Tidal Flow in the Filling Requirements
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jan 23 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The importance of cash flow statement in reducing credit risk and liquidity: بحث تطبيقي في مصرف الرشيد
...Show More Authors

Banks face different types of banking risks that limit the performance of its functions and achieve its objectives, including the financial risk that is based on current research into two types including a credit and liquidity risks. And established credit risk due to the possibility of delaying the borrowers to fulfill their obligations to the bank when due or non-payments on according to the terms agreed upon, while liquidity risk arises as a result of the inability of the bank to fund the financial needs, any inability to provide cash to pay its obligations short on credit without achieving tangible loss or the inability to employ the funds properly and show the liquidity risk in the event of inadequate cash inflows to the bank for an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Manual proposal to audit the automated accounting system in accordance with the framework (COBIT): Applied Research in the General Company for Petrochemical Industries
...Show More Authors

The information revolution، the new language has become one for all the peoples of the world through handling and exchange and to participate in all key areas (economic، cultural and scientific) and Accounting episode of this revolution has turned most of the traditional systems (manual) in companies to automated systems، this transformation in the regulations summoned from the auditors that develops their traditional examination automated systems so had to provide tools for auditing help auditors to keep abreast of developments and as a result there is no evidence checksum Local Private audited automated systems came search to provide evidence helps auditors for guidance as part of COBIT، which provides audit procedures Detailed inf

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
The effectiveness of intense pulsed light (home use) device in facial hair reduction
...Show More Authors

Background: Intense pulsed light (IPL) devices produce polychromatic incoherent high-intensity pulsed light with a specified wavelength spectrum, fluence, and pulse duration through the use of flashlamps and bandpass filters. Similar to lasers, IPL devices operate on the selective photothermolysis principle, with melanin acting as the chromophore. Despite this similarity, they are constructed differently and produce different amounts of light Aim of the study: To investigate the efficacy of IPL home-use device in hair reduction technique for women with unwanted facial hair. Subjects and methods: The study was conducted in Baghdad on forty-five female subjects with Fitzpatrick skin phototype (II to IV) and black, brown hair in a period of ei

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 02 2018
Journal Name
Journal Of The College Of Education For Women
The role of environmental governance in maintaining environmental systems and achieving urban sustainability
...Show More Authors

The solution to the problems and challenges of the twenty-first century requires the absorption of many transformations, such as demographic change, poverty reduction, the expansion of safe and clean energy without affecting the environment, as well as reducing health risks and other transitions. It also requires greater cooperation than is possible in the current global system, because both of these constraints and challenges, even if addressed locally or nationally, are because of the potential for their transnational impact, that is, their impact on the lives of people at the global level, Which is necessary to be fully addressed unless it is guided by a comprehensive global vision. This is what environmental governance provides in te

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
Intertextuality with Prophetic Hadith in the Poetry of Safiyaddin Alhilliyy (Tools and Implications)
...Show More Authors

 تحقق القراءةُ التَّناصيَّة قيمة موضوعيَّة للدرسِ النَّقديّ المعاصر؛ بمؤثراتها الثَّقافيَّة، والمعرفيَّة، لأنَّ الإبداعَ من سمات التُّراث الشِّعري في العصر الوسيط، وهو مسرحٌ لتداخلات نصِّيَّة مع مصادر متعددة دينيَّة، وأدبيَّة، وتاريخيَّة أداء ومضامين؛ يأتي اختيارُ (التَّناص مع الحديث النَّبوي في شعر صفيّ الدِّين الحلّي)؛ بوصفه امتدادًا شعريَّا أصيلًا لحضارة راقية معطاء

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 30 2020
Journal Name
College Of Islamic Sciences
Social Reform in the Light of Modern Islamic Thought (Malik bin Nabi model)
...Show More Authors

      Social reform is the main pillar of the organization of societies. Therefore, all religions and theories were directed to focus on this aspect as the most important element for the development of economic and cultural development. In addition to the analysis and application of the Islamic Sharia, he did not present a theory, but offered real solutions and remedies to the crises in our Arab and Islamic societies alike, despite the criticism directed at him. Z his opinions.

 

View Publication Preview PDF