Preferred Language
Articles
/
ijp-1004
Calculation of the Magnetic Dipole and Electric Quadrupole Moments of some Sodium Isotopes using Shell Model with Skyrme Interaction
...Show More Authors

         In the present work, the magnetic dipole and electric quadrupole moments for some sodium isotopes have been calculated using the shell model, considering the effect of the two-body effective interactions and the single-particle potentials. These isotopes are; 21Na (3/2+), 23Na (3/2+), 25Na (5/2+), 26Na (3+), 27Na (5/2+), 28Na (1+) and, 29Na (3/2+). The one-body transition density matrix elements (OBDM) have been calculated using the (USDA, USDB, HBUMSD and W) two-body effective interactions carried out in the sd-shell model space. The sd shell model space consists of the active 2s1/2, 1d5/2, and1d1/2 valence orbits above the inert 16O nucleus core, which remains closed. Skyrme interaction was implemented to generate the single-particle matrix elements with Hartree-Fock approximation and compared with those of harmonic oscillator and Wood-Saxon potentials. From the outcome of our investigation, it is possible to conclude that the shell model calculations with Skyrme-type interaction give a reasonable description for most of the selected Na isotopes. No significant difference was noticed for the magnetic dipole moments and electric quadrupole moments with experimental data, where all signs for the experimental data are reproduced correctly.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 14 2021
Journal Name
Egyptian Journal Of Chemistry
Real wastewater Treatment by Electrocoagulation- Electro-oxidation Combined System: Optimization using Taguchi Approach
...Show More Authors

In this study, the optimum conditions for COD removal from petroleum refinery wastewater by using a combined electrocoagulation- electro-oxidation system were attained by Taguchi method. An orthogonal array experimental design (L18) which is of four controllable parameters including NaCl concentration, C.D. (current density), PH, and time (time of electrolysis) was employed. Chemical oxygen demand (COD) removal percentage was considered as the quality characteristics to be enhanced. Also, the value of turbidity and TDS (total dissolved solid) were estimated. The optimum levels of the studied parameters were determined precisely by implementing S/N analysis and analysis of variance (ANOVA). The optimum conditions were found to be NaCl = 2.5

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison between robust methods in canonical correlation by using empirical influence function
...Show More Authors

       Canonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.

In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
Acetic acid concentration estimation using plastic optical fiber sensor based surface Plasmon resonance
...Show More Authors

Optical fiber chemical sensor based surface Plasmon resonance for sensing and measuring the refractive index and concentration for Acetic acid is designed and implemented during this work. Optical grade plastic optical fibers with a diameter of 1000μm were used with a diameter core of 980μm and a cladding of 20μm, where the sensor is fabricated by a small part (10mm) of optical fiber in the middle is embedded in a resin block and then the polishing process is done, after that it is deposited with about (40nm) thickness of gold metal and the Acetic acid is placed on the sensing probe.

View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Sat Mar 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Reinforcement Steel Corrosion Reduction by Using Fly Ash from South Baghdad Power Plant
...Show More Authors

Corrosion- induced damage in reinforced concrete structure such as bridges, parking garages, and buildings, and the related cost for maintaining them in a serviceable condition, is a source of major concern for the owners of these structures.
Fly ash produced from south Baghdad power plant with different concentrations (20, 25 and 30) % by weight from the cement ratio were used as a corrosion inhibitor as a weight ratio from the cement content.
The concrete batch ratio under study was (1:1.5:3) cement, sand and gravel respectively which is used in Iraq. All the raw materials used were locally manufactured.
Concrete slabs (250x250x70) mm dimensions were casted, using Poly-wood molds. Two steel bars were embedded in the central po

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
International Journal Of Ambient Energy
Energy generation by membraneless microfluidic fuel cell using acidic wastewater as a fuel
...Show More Authors

A simple and novel membraneless paper-based microfluidic fuel cell was presented in this study. The occurrence of laminar flow was employed to ensure no mixing of the fuel and oxidant fluids along the bath of reaction. The acidic wastewater was used as a fuel. It was an air-breathing cell, so air and tab water were used as oxidants. Both the fuel and tab water flowed continuously under gravity. Whatman filter paper was used for preparation of the fuel cell channel and two carbon fibre electrodes were used and firmed on the edges of the cell. The performance of the cell was examined over three consecutive days. The results indicated that the present cell has the potential to generate electric power, but an extensive study is required to harv

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Apr 02 2023
Journal Name
Narst 2023 Annual International Conference
Measuring Claim-Evidence-Reasoning Using Scenario-based Assessments Grounded in Real-world Issues
...Show More Authors

Improving students’ use of argumentation is front and center in the increasing emphasis on scientific practice in K-12 Science and STEM programs. We explore the construct validity of scenario-based assessments of claim-evidence-reasoning (CER) and the structure of the CER construct with respect to a learning progression framework. We also seek to understand how middle school students progress. Establishing the purpose of an argument is a competency that a majority of middle school students meet, whereas quantitative reasoning is the most difficult, and the Rasch model indicates that the competencies form a unidimensional hierarchy of skills. We also find no evidence of differential item functioning between different scenarios, suggesting

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 11 2018
Journal Name
Al-khwarizmi Engineering Journal
Control on a 2-D Wing Flutter Using an Adaptive Nonlinear Neural Controller
...Show More Authors

An adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Human Skin WoundWelding Using 980 nm Diode Laser: an in Vitro Experimental Study
...Show More Authors

Laser assisted skin wound closure offers many distinct advantages over conventional closure
techniques. The objective of this in vitro experimental study, carried out at the Institute of Laser for
Postgraduate Studies/Baghdad University, was to determine the effectiveness of 980 nm diode laser in
welding of human skin wounds. Multiple 3-4 cm long full thickness incisions in a specimen of human
skin obtained from the discarded panniculus of an Abdominoplasty operation were tried to be laser
welded using a 4 mm spot diameter laser beam from a 980 nm diode laser at different laser parameters
and modes of action. The tensile strength at the weld site was analyzed experimentally. Although laser
assisted wound welding did

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
An Algorithm for nth Order Intgro-Differential Equations by Using Hermite Wavelets Functions
...Show More Authors

In this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More