Preferred Language
Articles
/
ijp-278
Investigation of the nuclear structure of 84-108Mo isotopes using Skyrme-Hartree-Fock method
...Show More Authors

Over the last few decades the mean field approach using selfconsistent
Haretree-Fock (HF) calculations with Skyrme effective
interactions have been found very satisfactory in reproducing
nuclear properties for both stable and unstable nuclei. They are
based on effective energy-density functional, often formulated in
terms of effective density-dependent nucleon–nucleon interactions.
In the present research, the SkM, SkM*, SI, SIII, SIV, T3, SLy4,
Skxs15, Skxs20 and Skxs25 Skyrme parameterizations have been
used within HF method to investigate some static and dynamic
nuclear ground state proprieties of 84-108Mo isotopes. In particular,
the binding energy, proton, neutron, mass and charge densities and
corresponding root mean square radius, neutron skin thickness and
charge form factor are calculated by using this method with the
Skyrme parameterizations mentioned above. The calculated results
are compared with the available experimental data. Calculations
show that the Skyrme–Hartree–Fock (SHF) theory with above
force parameters provides a good description on Mo isotopes.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
A Real-Time Fuzzy Load Flow and Contingency Analysis Based on Gaussian Distribution System
...Show More Authors

Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed  method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Novel Heuristic Approach for Solving Multi-objective Scheduling Problems
...Show More Authors

    In this paper, we studied the scheduling of  jobs on a single machine.  Each of n jobs is to be processed without interruption and becomes available for processing at time zero. The objective is to find a processing order of the jobs, minimizing the sum of maximum earliness and maximum tardiness. This problem is to minimize the earliness and tardiness values, so this model is equivalent to the just-in-time production system. Our lower bound depended on the decomposition of the problem into two subprograms. We presented a novel heuristic approach to find a near-optimal solution for the problem. This approach depends on finding efficient solutions for two problems. The first problem is minimizing total completi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2013
Journal Name
International Journal Of Computer Applications
Mixed Convection in a Square Cavity Filled with Porous Medium with Heated Bottom Wall
...Show More Authors

Two-dimensional unsteady mixed convection in a porous cavity with heated bottom wall is numerically studied in the present paper. The forced flow conditions are imposed by providing a hydrostatic pressure head at the inlet port that is located at the bottom of one of the vertical side walls and an open vent at the top of the other vertical side wall. The Darcy model is adopted to model the fluid flow in the porous medium and the combination effects of hydrostatic pressure head and the heat flux quantity parameters are carefully investigated. These governing parameters are varied over wide ranges and their effect on the heat transfer characteristics is studied in detail. It is found that the time required to reach a desired temperature at th

... Show More
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
New Approach for Solving Three Dimensional Space Partial Differential Equation
...Show More Authors

This paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.

       Finally, all algori

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Engineering
Mixed Convection in a Square Cavity Filled with Porous Medium with Bottom Wall Periodic Boundary Condition
...Show More Authors

Transient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic pressure head , , , , and ), sinusoidal amplitude range of

... Show More
Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Parallel Routing in Wireless Sensor Network
...Show More Authors

The limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Polyvinyl Alcohol – Sodium Nitrite Water Soluble Composite as a Corrosion Inhibitor for Mild Steel in Simulated Cooling Water
...Show More Authors

The inhibitive action of polyvinyl alcohol –sodium nitrite (PVASN) composite on the corrosion of mild steel in simulated cooling water (SCW) has been investigated by weight loss and potentiodynamic polarization. The effect of composite concentration (PVA/SN) , pH, and exposure time on corrosion rate of mild steel were verified using 2 levels factorial design and surface response analysis through weight loss approach, while the electrochemical measurements were used to study the behavior of mild steel in (SCW) with pH between 6 and 8 and in absence and presence of (PVA) in solution containing different concentration of NaNO2. It was verified that all three main variables studied were statistically significant while their interaction is

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Mixed Convection in a Square Cavity Filled with Porous Medium with Bottom Wall Periodic Boundary Condition
...Show More Authors

Transient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic  pressure sinusoidal  amplitude  range and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Energy Methods For Initial –Boundary String Problem
...Show More Authors

  We study one example of hyperbolic problems it's Initial-boundary string problem with two ends. In fact we look for the solution in weak sense in some sobolev spaces. Also we use energy technic with Galerkin's method to study some properties for our problem as existence and uniqueness

View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref