Preferred Language
Articles
/
ijs-7065
Nucleon momentum distributions and elastic electron scattering form factors for 50Cr, 52Cr and 54Cr isotopes
...Show More Authors

In the framework of correlation method so-called coherent density fluctuation model (CDFM) the nucleon momentum distributions (NMD) of the ground state for some even mass nuclei of fp-shell like 50Cr, 52Cr and 54Cr isotopes are examined. Nucleon momentum distributions are expressed in terms of the fluctuation function (|f(x)|2) which is evaluated by means of the nucleon density distributions (NDD) of the nuclei and determined from theory and experiment. The main characteristic feature of the NMD obtained by CDFM is the existence of high-momentum components, for momenta k ≥ 2 fm−1. For completeness, also elastic electron scattering form factors, F(q) are evaluated within the same framework.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 26 2019
Journal Name
Iraqi Journal Of Science
Bayesian Estimation for Two Parameters of Gamma Distribution under Generalized Weighted Loss Function
...Show More Authors

This paper deals with, Bayesian estimation of the parameters of Gamma distribution under Generalized Weighted loss function, based on Gamma and Exponential priors for the shape and scale parameters, respectively. Moment, Maximum likelihood estimators and Lindley’s approximation have been used effectively in Bayesian estimation. Based on Monte Carlo simulation method, those estimators are compared in terms of the mean squared errors (MSE’s).

Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Tue Jun 14 2022
Journal Name
Al-academy
The prospects ability of contemporary epistemology for signification internal construction of plastic artwork
...Show More Authors

Based on the systematic scientific investigation of artistic achievement, researchers (critics) adhere to mechanisms based on epistemology, through which it is envisaged to reveal the meaning of the achievement as the product of three actors: the effectiveness of an artistic sense, the effectiveness of an idea, and the arousal of taste according to systematic criticism procedures that investigate the new artistic achievement. Or, in a specific way, the possibility of meaning in all the accomplished from the aesthetics of artistic presentation and the character of the self-accomplished by the "artist" and the critic invokes his critical tools with certain cognitive foundations. In defining its nature from the rest of the other cultural ac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 25 2019
Journal Name
Iraqi Journal Of Physics
Simulation of indoor solar illumination system for a library hall in Baghdad city
...Show More Authors

A concept of indoor solar illumination is described and simulated. The solar illumination system is composed of a tracking primary reflector, a selective secondary reflector, a visible light guide and a scattering solid glass tube fixture. Each part of the solar illumination system is optically suited and compatible with other parts to realize high efficiency. The simulation is conducted for Baghdad city for a library hall. Two major days over a year are chosen to investigate the illumination system for acceptable visible light level for reading hall. The two days are: summer solstice day and winter solstice day at 8:00 AM and 12:00 PM for each. Research results showed that the design of the solar system is achieved on the base of minimu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Engineering
Direct Contact Membrane Distillation for Separation of Hcl From A Mixture of Acids
...Show More Authors

HCl is separated from HCl –H2SOsolution by membrane distillation process(MD). The flat –sheet membranes made from polyvinylidene fluoride (PVDF) and polypropylene (pp.). Plate and frame these types of membrane where used in the process. The feed is a mixture of HCl and H2SO4 acids compositions depended on metals treated object.HCl concentration increased in the permeate during the process but sulfuric acid increased gradually in the feed .During the concentration of solution acids concentrations in the feed at the beginning were 50 g/dm3 of sulfuric acid and 50 g/dm3 of hydrochloric acid at 333K feed temperature the permeate flux was 71 dm

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Application of 2D Electrical Resistivity Imaging Technique for Detecting Soil Cracks: Laboratory Study
...Show More Authors

Cracking of soils affects their geotechnical properties and behavior such as soil strength and stability. In this paper, 2D Electrical Resistivity Imaging Method, as a non-invasive technique, was adopted to investigate the effect of soil cracks of a centemetric scale on resistivity of sandy soil. The electrical resistivity measurements were carried out using ABEM SAS 300C Terrameter system at a laboratory scale using Wenner array. The measurements were interpreted using horizontal profiles, forward modeling and 2D inverse resistivity sections. The results showed that soil cracks cause significant changes in soil resistivity. These changes can be attributed to the high resistivity contrast between the highly resistive air-filled cracks an

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Probabilistic Model building using the Transformation Entropy for the Burr type –xii Distribution
...Show More Authors

Entropy define as uncertainty measure has been transfared by using the cumulative distribution function and reliability function for the Burr type – xii. In the case of data which suffer from volatility to build a model the probability distribution on every failure of a sample after achieving limitations function, probabilistic distribution. Has been derived formula probability distribution of the new transfer application entropy on the probability distribution of continuous Burr Type-XII and tested a new function and found that it achieved the conditions function probability, been derived mean and function probabilistic aggregate in order to be approved in the generation of data for the purpose of implementation of simulation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 17 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Radiographic follow up for clinical cases of mandibular implant retained overdenture MIR-OD
...Show More Authors

Background: The use of osseointegrated fixtures in dentistry has been demonstrated both histologically and clinically to be beneficial in providing long term oral rehabilitation in completely edentulous individual. Most patients suffer from denture instability; particularly with mandibular prosthesis, the use of dental implant will be benefit significantly from even a slight increase in retention. The concept of implanting two to four fixtures in a bony ridge to retain a complete denture prosthesis appealing therefore, as retention, stability and acceptable economic compromise to the expanse incurred with the multiple fixture supported fixed prosthesis. Materials and methods in this study the sample were eight patients selected from a hosp

... Show More
View Publication Preview PDF