Preferred Language
Articles
/
ijs-11308
Study of Matter Density Distributions, Elastic Electron Scattering form Factors and Reaction Cross Sections of 8He And 17B Exotic Nuclei
...Show More Authors

The ground state densities of unstable neutron-rich 8He and 17B exotic nuclei are studied via the framework of the two-frequency shell model (TFSM) and the binary cluster model (BCM). In TFSM, the single particle harmonic oscillator wave functions are used with two different oscillator size parameters βc and βv where the former is for the core (inner) orbits and the latter is for the valence (halo) orbits. In BCM, the internal densities of the clusters are described by single particle Gaussian wave functions. Shell model calculations for the two valence neutrons in 8He and 17B are performed via the computer code OXBASH. The long tail performance is clearly noticed in the calculated neutron and matter density distributions of these nuclei. The structure of the two valence neutrons in 8He and 17B is found to be a mixed configurations with dominant (1p1/2)2 and (2s1/2)2, respectively. Elastic electron scattering proton form factors for 8He and 17B are studied using the plane wave born approximation (PWBA). It is found that the major difference between the calculated form factors of unstable nuclei [8He, 17B] and those of stable nuclei [4He, 10B] is the difference in the center of mass correction which depends on the mass number and the size parameter β (which is assumed in this case as the average of βc and βv). The reaction cross sections for 8He and 17B are studied by means of the Glauber model with an optical limit approximation using the ground state densities of the projectile and target, where these densities are described by single Gaussian functions. The calculated reaction cross sections of 8He and 17B at high energy are in good agreement with the experimental data. The analysis of the present study supports the halo structure of these nuclei.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Inventory control by using Fuzzy set theory An Applied Research at the Baghdad Soft Drinks Company
...Show More Authors

The production companies in the Iraqi industry environment facing many of the problems related to the management of inventory and control In particular in determining the quantities inventory that should be hold it. Because these companies  adoption on personal experience and some simple mathematical methods which lead to the identification of inappropriate quantities of inventory.

       This research aims to identify the economic quantity of production and purchase for the Pepsi can 330ml and essential components in Baghdad soft drinks Company in an environment dominated by cases of non ensure and High fluctuating as a result of fluctuating demand volumes and costs ass

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A parallel Numerical Algorithm For Solving Some Fractional Integral Equations
...Show More Authors

In this study, He's parallel numerical algorithm by neural network is applied to type of integration of fractional equations is Abel’s integral equations of the 1st and 2nd kinds. Using a Levenberge – Marquaradt training algorithm as a tool to train the network. To show the efficiency of the method, some type of Abel’s integral equations is solved as numerical examples. Numerical results show that the new method is very efficient problems with high accuracy.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Euro Dinar Trading Analysis Using WARIMA Hybrid Model
...Show More Authors

The rise in the general level of prices in Iraq makes the local commodity less able to compete with other commodities, which leads to an increase in the amount of imports and a decrease in the amount of exports, since it raises demand for foreign currencies while decreasing demand for the local currency, which leads to a decrease in the exchange rate of the local currency in exchange for an increase in the exchange rate of currencies. This is one of the most important factors affecting the determination of the exchange rate and its fluctuations. This research deals with the currency of the European Euro and its impact against the Iraqi dinar. To make an accurate prediction for any process, modern methods can be used through which

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Kinetic Model for Solute Diffusion in Liquid Membrane Systems
...Show More Authors

In this study, a mathematical model for the kinetics of solute transport in liquid membrane systems (LMSs) has been formulated. This model merged the mechanisms of consecutive and reversible processes with a “semi-derived” diffusion expression, resulting in equations that describe solute concentrations in the three sections (donor, acceptor and membrane). These equations have been refined into linear forms, which are satisfying in the special conditions for simplification obtaining the important kinetic constants of the process experimentally.

View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Large Campus Network Using hierarchical Model
...Show More Authors

This paper presents a hierarchical model of localized company effective when is used in a university campus or site. To highlight the standard criteria for each layer of the model and to prove the positive aspects of this model is the best in use and make the Dell Network as case of study. Through the case of study it has been shown that the expansion of the on-site network does not affect services or bandwidth.

View Publication Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Noble Metals/NiO Core- Shell Based Gas Sensors
...Show More Authors

The application of novel core-shell nanostructure composed of Cu, Ag, Au/NiO to improve the sensitivity of pure NiO to H2S gas sensors is demonstrated in this study. The growth of Cu, Ag, Au/NiO core-shell nanostructure is performed by chemical reaction of NiO on metal nanoparticle (Cu, Ag and Au) that prepared by pulsed laser ablation (PLA( technique. This is to form the homogeneous structure of the sensors investigated in this report to assess their sensitivity in terms of H2S detection. These novel H2S gas sensors were evaluated at operating temperatures of 25 °C, 100 °C and at 150 °C. The result reveals the Cu, Ag, Au/NiO core-shell nanostructure present a good sensitivity at low working temperatures compared by pure NiO nanoparti

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Lymphocyte phenotyping in untreated children patients with chronic allergic asthma
...Show More Authors

This study aimed to isolate and phenotype lymphocytes in untreated children patients with chronic allergic asthma. To reach such aim the study involved (25) patients from children (17 male and 9 female) whom their ages where between (3-10) years, in addition to (15) apparently healthy children (9 male and 6 female) in the same ages involved as control group. The data demonstrated that there was a significant increase in the mean percentages of T-lymphocytes (CD3+ cells) in the peripheral blood of patients (66.75±0.29)**, in comparison with control group (43.58±0.19), a significant increase in the mean percentages of T-helper lymphocytes (CD4+ cells) in the pe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Some New Results on Lucky Labeling
...Show More Authors

Czerwi’nski et al. introduced Lucky labeling in 2009 and Akbari et al and A.Nellai Murugan et al studied it further. Czerwi’nski defined Lucky Number of graph as follows: A labeling of vertices of a graph G is called a Lucky labeling if  for every pair of adjacent vertices u and v in G where . A graph G may admit any number of lucky labelings. The least integer k for which a graph G has a lucky labeling from the set 1, 2, k is the lucky number of G denoted by η(G). This paper aims to determine the lucky number of Complete graph Kn, Complete bipartite graph Km,n and Complete tripartite graph Kl,m,n. It has also been studied how the lucky number changes whi

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Automatic Number Extraction from Fixed Imaging Distance
...Show More Authors

     Developed countries are facing many challenges to convert large areas of existing services to electronic modes, reflecting the current nature of workflow and the equipment utilized for achieving such services. For instance, electricity bill collection still tend to be based on traditional approaches (paper-based and relying on human interaction) making them comparatively time-consuming and prone to human error.

This research aims to recognize numbers in mechanical electricity meters and convert them to digital figures utilizing Optical Character Recognition (OCR) in Matlab. The research utilized the location of red region in color electricity meters image to determine the crop region that contain the meters numbers, then

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref