Preferred Language
Articles
/
ijs-6202
Elastic electron scattering from Te-isotopes in the framework of Skyrme-Hartree-Fock method
...Show More Authors

The ground state charge, proton and matter densities and their rms radii of some Te-isotopes are studied by means of the Skyrme–Hartree–Fock (SHF) method with the Skyrme parameters namely; SKB, SGI, SKM, SKX, MSK7 and SLy4. Also, the neutron skin thickness, the elastic charge form factor and the binding energy per nucleon are calculated in the same framework. The calculated results have been compared with the available experimental data.
PACS Nos.: 21.10.Ft, 25.30.Bf

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Multiple Mixing Ratios of Gamma Rays From Reaction Using a2-ratio Method
...Show More Authors

The -multiple mixing ratios of γ-transitions from levels of  populated in the  are calculated in the present work by using the a2-ratio methods.  We used the experimental coefficient (a2) for two γ -transitions from the same initial state, the statistical tensor, which is related to the a2-coefficient would be the same for the two transitions.  This method was used in a previous work for pure transitions or which can be considered pure. In these cases the multiple mixing ratios for the second transition ( ) equal zero, but in our work we applied this method for mixed γ-transitions and then the multiple mixing ratio ( ) is known for one transition. Then we calculate the ( ) value and versareversa.  The we

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Intelligence framework dust forecasting using regression algorithms models
...Show More Authors

<span>Dust is a common cause of health risks and also a cause of climate change, one of the most threatening problems to humans. In the recent decade, climate change in Iraq, typified by increased droughts and deserts, has generated numerous environmental issues. This study forecasts dust in five central Iraqi districts using machine learning and five regression algorithm supervised learning system framework. It was assessed using an Iraqi meteorological organization and seismology (IMOS) dataset. Simulation results show that the gradient boosting regressor (GBR) has a mean square error of 8.345 and a total accuracy ratio of 91.65%. Moreover, the results show that the decision tree (DT), where the mean square error is 8.965, c

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
An Artificial Intelligence-based Proactive Network Forensic Framework
...Show More Authors

     is at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
مجلة المستنصرية للعلوم والتربية
Calculation of Electron Drift Velocity in Xenon Gas Using Boltzmann Equation Analysis
...Show More Authors

Publication Date
Thu Mar 06 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An in-vitro scan electron microscope comparative study of dentine-Biodentine interface
...Show More Authors

Background: Restoration of the gingival margin of Class II cavities with composite resin continues to be problematic, especially where no enamel exists for bonding to the gingival margin. The aim of study is to evaluate the marginal leakage at enamel and cementum margin of class II MOD cavities using amalgam restoration and modern composite restorations Filtek™ P90, Filtek™ Z250 XT (Nano Hybrid Universal Restorative) and SDR bulk fill with different restoratives techniques. Materials and method: Eighty sound maxillary first premolar teeth were collected and divided into two main groups, enamel group and cementum group (40 teeth) for each group. The enamel group was prepared with standardized Class II MOD cavity with gingival margin (1 m

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 01 2013
Journal Name
Micron
Computational investigation of electron path inside SEM chamber in mirror effect phenomenon
...Show More Authors

View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed May 17 2023
Journal Name
Journal Of The Australian Ceramic Society
Dielectric and scattering properties of transparent SiC composite in X-band range for radome application
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Feb 28 2020
Journal Name
Neuroquantology
Studying the Swarm Parameters and Electron Transport Coefficients in N2– CH4 Mixtures Using BOLSIG+ Program
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Theoretical Study for the Electron Drift Velocity in Sf6 Gas and Its Mixture with Nitrogen
...Show More Authors

 Calculations and predication a theoretical formulas for the electron drift velocity in a gas medium are achieved to deduced the electron distribution function for different gas concentrations. The calculations are achieved by using the numerical solution for  Boltzmann transport equation in two term approximation, using the NOMAD  program for the drift velocity in a gas medium. It's necessary to note that the solution is essentially depending upon the elastic and inelastic collision cross section. In order to fixe a good accuracy for the using cross section it's necessary to calculate the electron distribution function and therefore study their behavior. Results about the electron drift velocity show that a decreasing pro

... Show More
View Publication Preview PDF