Preferred Language
Articles
/
ijp-270
A study of Fermi hole and partial Fermi hole for Li- and C-Atoms in different states 1s 2p, 1s 3p, 1s 3d and 2s 2p
...Show More Authors

The electron correlation effect for inter-shell have been analysed in terms of Fermi hole and partial Fermi hole for Li-atom in the excited states (1s2 3p) and (1s2 3d) using Hartree-Fock approximation (HF). Fermi hole Δf(r12) and partial Fermi hole Δg(r12 ,r1) were determined in position space. Each plot of the physical properties in this work is normalized to unity. The calculation was performed using Mathcad 14 program.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Monatshefte Für Chemie - Chemical Monthly
Al-, Ga-, and In-decorated BP nanotubes as chemical sensors for 2-chloroethanol
...Show More Authors

B3LYP density functional is utilized for probing the effect of decorating Al, Ga, and In on the sensing performance of a boron phosphide nanotube (BPNT) in detecting the 2-chloroethanol (CHE) molecule. We predict that the interaction of pure BPNT with CHE is physisorption, and the sensing response (SR) of BPNT is approximately 6.3. The adsorption energy of CHE is about − 26.3 to − 91.1, − 96.6, and − 100.3 kJ/mol, when the Al, Ga, and In metals are decorated on the BPNT surface, respectively. This indicates that the decorated metals significantly strength the interaction. Also, the corresponding SR meaningfully rises to 19.4, 41.0, and 93.4, indicating that by increasing the atomic number of metals, the sensitivity i

... Show More
View Publication
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Research Journal Of Pharmacy And Technology
Estimating the plain and negative tendonography techniques for evaluating injured tendon in rabbit
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Apr 11 2011
Journal Name
Icgst
Employing Neural Network and Naive Bayesian Classifier in Mining Data for Car Evaluation
...Show More Authors

In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.

Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Iraq's Position For Lebanese Civil War 1975-1976 in Iraqi and Arabian Newspapers
...Show More Authors

The research deals with Iraq's position of the Lebanese civil war and the Efforts made by Iraq in order to stop the bleeding of this war, the research also deals with the nature of regime in Lebanon and the developments that preceded the war and the positions of the internal and external competing forces, as weu as handling the Iraqi Syrian disagreement and it's impaet on the situation of Lebanon and the war developments.
The research focused on the Iraq's position towards the externd proposed solutions to solve the Lebanese civil war.

View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Lithology and minerals identification from well logs for Mishrif Formation in Ratawi oilfield
...Show More Authors

   Lithology identification plays a crucial role in reservoir characteristics, as it directly influences petrophysical evaluations and informs decisions on permeable zone detection, hydrocarbon reserve estimation, and production optimization. This paper aims to identify lithology and minerals composition within the Mishrif Formation of the Ratawi Oilfield using well log data from five open hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. At this step, the logging lithology identification tasks often involve constructing a lithology identification model based on the assumption that the log data are interconnected. Lithology and minerals were identified using three empirical methods: Neutron-Density cross plots for lithology id

... Show More
View Publication
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Suggestive Framework for Applying Performance and Programs Budget in Iraqi Government Units Environment
...Show More Authors

Abstract

This research  aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This  is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 20 2024
Journal Name
Ingénierie Des Systèmes D Information
Enabling Technologies for Ultra-Low Latency and High-Reliability Communication in 6G Networks
...Show More Authors

View Publication Preview PDF
Scopus (15)
Crossref (12)
Scopus Crossref
Publication Date
Thu Jul 25 2024
Journal Name
International Journal Of Professional Studies
Football and Racism in Roy Williams' Sing Yer Heart out for the Lads
...Show More Authors

Publication Date
Tue Jul 01 2025
Journal Name
South African Journal Of Chemical Engineering
Expired azithromycin and cephalexin as corrosion inhibitors for aluminum in saline-acidic solution
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref