In this research, the Williamson-Hall method and of size-strain plot method was employed to analyze X- ray lines for evaluating the crystallite size and lattice strain and of cadmium oxide nanoparticles. the crystallite size value is (15.2 nm) and (93.1 nm) and lattice strain (4.2 x10−4 ) and (21x10−4) respectively. Also, other methods have been employed to evaluate the crystallite size. The current methods are (Sherrer and modified Sherrer methods ) and their results are (14.8 nm) and (13.9nm) respectively. Each method of analysis has a different result because the alteration in the crystallite size and lattice strain calculated according to the Williamson-Hall and size-strain plot methods shows that the non-uniform strain in nanoparticles.
The estimation of the stressÙ€ strength reliability of Invers Kumaraswamy distribution will be introduced in this paper based on the maximum likelihood, moment and shrinkage methods. The mean squared error has been used to compare among proposed estimators. Also a Monte Carlo simulation study is conducted to investigate the performance of the proposed methods in this paper.
Coronavirus is considered the first virus to sweep the world in the twenty-first century, it appeared by the end of 2019. It started in the Chinese city of Wuhan and began to spread in different regions around the world too quickly and uncontrollable due to the lack of medical examinations and their inefficiency. So, the process of detecting the disease needs an accurate and quickly detection techniques and tools. The X-Ray images are good and quick in diagnosing the disease, but an automatic and accurate diagnosis is needed. Therefore, this paper presents an automated methodology based on deep learning in diagnosing COVID-19. In this paper, the proposed system is using a convolutional neural network, which is considered one o
... Show MoreIn this work, the optical emission spectrum technique was used to analyze the spectrum resulting from the CdO:Sn plasma produced by laser Nd:YAG with a wavelength of (1064) nm, duration of (9) ns, and a focal length of (10) cm in the range of energy of 500-800 mJ. The electron temperature (Te) was calculated using the in ratio line intensities method, while the electron density (ne) was calculated using Saha-Boltzmann equation. Also, other plasma parameters were calculated, such as plasma (fp), Debye length (λD) and Debye number (ND). At mixing ratios of X=0.1, 0.3 and 0.5, the CdO1-X :SnX plasma spectrum was recorded for different energies. The change
... Show MoreEvaluation of trace elements in Iraqi chewing gums are unavailable, particularly pollution of toxic elements, materials which change the values of PH in the Oral. Atomic Absorption Spectroscopy (AAS) were successfully employed to determine the concentration of 7 trace elements (essentially toxic and nonessential) and the PH, in thirteen different brands of chewing gum generally consumed in Iraq. Combined wet and dry digestion procedures were applied. Two types of heated graphite tubes were used, coated and uncoated tubes treated with tungsten solution. Result showed that Cu, Al and Zn were at very high levels in almost all brands whereas Mn was found to be high in brands A and O only.
The study aims to identify how to build the media message in an artistic design style (infographic) to reach the mechanism of building the media message by infographic in the researched news sites. For the survey method, which is one of the best methods used to study the subject of the research, the researcher used the method of content analysis, the employee of the research tool, a quantitative and qualitative content analysis form for the study of 74 infographics that appeared during the research period in the research sample sites. The study revealed a number of results, most notably 1. The surveyed sites employed the information in a manner based on images, shapes and data, that is, through the use of the visual element and the
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreYohimbine is actually confirmed in the United States to be utilized for erectile dysfunction; and recently such drug has become commonly used in body-building communities for its presumed lipolytic and sympathomimetic effects. But ingestion of such drug can bring about epileptic neurotoxic effects.
Many antiepileptic drugs can be utilized to counteract myoclonic seizure; furthermore, diazepam can be used to oppose such type of seizure; in addition, surrogate therapeutic options such as omega 3 may also be utilized.
In this study, twenty-four (24) mice of both sexes weighing 20-25g were randomly-allocated into 4 groups (6 animals each group) as follows: Group I-
... Show MoreDiabetes Mellitus (DM) is a chronic disease distributed worldwide and dominantly related to different types of diseases especially microbial infections, this study aimed to find the relationship between DM mouth microbiome and some demographic factors. Sixty saliva specimens and bacterial oral swabs were collected from randomly selected DM patients, including 29 females and 31 males enrolled in this study, which was obtained from the Al-Mustansiriya University national diabetes center in Baghdad, and other 40 apparently healthy people specimens and swabs were collected from 25 females and 15 males as a control group for the period starting November / 2021 to February / 2022. The results revealed that the most prevalent bacterial gener
... Show MoreThe duration of the contract is a legal term first provided for in French Amendment Decree No. 131/2016, and given the increasing importance of time in contracts, we have chosen to study the legal rules governing time at the formative stage by drawing on changes in French law compared to both Iraqi and Egyptian laws. Article 1102 of French Amendment Decree No. 131/2016 stipulates that: "Everyone is free to contract or not to contract, to choose the person with whom he contracts, and to determine the content and form of the contract within the limits established by law." Contractual freedom does not permit a breach of the rules relating to public order), as well as article 1104, which provides for (contracts must be nego
... Show More