Preferred Language
Articles
/
ijp-158
The pre-equilibrium and equilibrium double differential cross sections for the nucleons and light nuclei induce nuclear reactions on 27Al nuclei
...Show More Authors

The pre - equilibrium and equilibrium double differential cross
sections are calculated at different energies using Kalbach Systematic
approach in terms of Exciton model with Feshbach, Kerman and
Koonin (FKK) statistical theory. The angular distribution of nucleons
and light nuclei on 27Al target nuclei, at emission energy in the center
of mass system, are considered, using the Multistep Compound
(MSC) and Multistep Direct (MSD) reactions. The two-component
exciton model with different corrections have been implemented in
calculating the particle-hole state density towards calculating the
transition rates of the possible reactions and follow up the calculation
the differential cross-sections, that include MSC and MSD models.
The finite well depth, isospin, shell effects, Pauli effect, charge
effect, pairing, surface, angular and linear momentum distributions
corrections are considered in this work. The nucleons (n and p) and
light nuclei (2D and 3T) have been employed as projectiles at the
target 27Al nuclei and at different incident energies (4MeV, 14 MeV
and 14.8MeV). The results have been compared with the available
experimental and theoretical published work. The comparisons show
an acceptable agreement with the TALAYS code (Tendel 2014) for
the reactions: 27Al (n, n) 27Al, 27Al (p, n) 63Zn, 27Al (p, D) 62Cu, 27Al
(p, p) 63Cu and 27Al (p, 4He)60Ni and at different emission energies
and angles.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Bioadsorption of Heavy Metals From Industrial Wastewater Using Some Species of Bacteria
...Show More Authors

Three isolated bacteria were examined to remove heavy metals from the industrial wastewater of the Diala State Company of Electrical Industries, Diyala-Iraq. The isolated bacteria were identified as Pseudomonas aeruginosa, Escherichia coli and Sulfate Reducing Bacteria (SRB). The three isolates were used as an adsorption factor for different concentrations of Lead and Copper (100, 150, and 200 ppm.), in order to examine the adsorption efficiency of these isolates. In addition, the effect of three factors on heavy metals adsorption were examined; temperature (25, 30, and 37 ?C), pH (3 and 4.5) and contact time (2 and 24 hrs). The results showed that the highest level of lead adsorption was obtained at 37 ?C by E. coli, P, aerugenosa and

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
Education of Thinking as a Necessity in Education Inst. Asmaa Hasan Shalash
...Show More Authors

The concept of education is not actually restricted to children or school students, but rather  every person   should be educated and followed up if he  is intended to grow and prove, with effort and time allocation  as to fulfill that goal.  Thus , the current paper aims to a thinking education and to educate that thinking in teacher  and it is not new to deal with the personal characteristics of teacher  in the different  scientific , and educational researches . But ,these research did not address the necessity of acquiring the skill of thinking, especially as it affects teacher's presentation of the content of the curriculum or even content outside the curriculum, and therefore, there is n

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Viable Strategies to Increase Clinical Trial Patient Diversity
...Show More Authors

In the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Materials Letters
Determination of third order susceptibility of carbon quantum dots at different concentrations
...Show More Authors

The nonlinear refractive (NLR) index and third order susceptibility (X3) of carbon quantum dots (CQDs) have been studied using two laser wavelengths (473 and 532 nm). The z-scan technique was used to examine the nonlinearity. Results showed that all concentrations have negative NLR indices in the order of 10−10 cm2/W at two laser wavelengths. Moreover, the nonlinearity of CQDs was improved by increasing the concentration of CQDs. The highest value of third order susceptibility was found to be 3.32*10−8 (esu) for CQDs with a concentration of 70 mA at 473 nm wavelength.

View Publication
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Advances In Mathematics
B-Closed Topological Spaces in Terms of Grills
...Show More Authors

The concept of -closedness, a kind of covering property for topological spaces, has already been studied with meticulous care from different angles and via different approaches. In this paper, we continue the said investigation in terms of a different concept viz. grills. The deliberations in the article include certain characterizations and a few necessary conditions for the -closedness of a space, the latter conditions are also shown to be equivalent to -closedness in a - almost regular space. All these and the associated discussions and results are done with grills as the prime supporting tool.

Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Global Pharma Technology
Influence of immune engines in iraqi patients with acute myeloid leukemia
...Show More Authors

Acute myeloid leukemia (AML) is heterogeneous disorders originated from the abnormalities in the proliferation and maturation of myeloid progenitors in bone morrow. There is a clinical correlation between immunity engines and disease progression, but this relationship is not completely clear yet. This study was designed to assess the full immune response in Iraqi patients diagnosed with AML. Patients and healthy volunteers were divided into three groups: newly diagnosed untreated, under chemotherapy treatment patients and control group. A significant reduction were seen in C4 and IFN-γ levels in both untreated and treated groups with no significant difference between untreated and treated groups. On the other hand, IL-2 and IL-8 levels inc

... Show More
Scopus
Publication Date
Sat Dec 24 2022
Journal Name
Wasit Journal For Pure Science
β*-Regular supra topological spaces
...Show More Authors

Form the series of generalization of the topic of supra topology is the generalization of separation axioms . In this paper we have been introduced (S * - SS *) regular spaces . Most of the properties of both spaces have been investigated and reinforced with examples . In the last part we presented the notations of supra *- -space ( =0,1) and we studied their relationship with (S * - SS *) regular spaces.

Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Lossless Compression of Medical Images using Multiresolution Polynomial Approximation Model
...Show More Authors

In this paper, a simple fast lossless image compression method is introduced for compressing medical images, it is based on integrates multiresolution coding along with polynomial approximation of linear based to decompose image signal followed by efficient coding. The test results indicate that the suggested method can lead to promising performance due to flexibility in overcoming the limitations or restrictions of the model order length and extra overhead information required compared to traditional predictive coding techniques.

View Publication
Crossref (4)
Crossref