Preferred Language
Articles
/
jBfXjJABVTCNdQwCg4yX
A comparative study of Williamson-Hall method and size-strain method through X-ray diffraction pattern of cadmium oxide nanoparticle
...Show More Authors

In this research, the Williamson-Hall method and of size-strain plot method was employed to analyze X- ray lines for evaluating the crystallite size and lattice strain and of cadmium oxide nanoparticles. the crystallite size value is (15.2 nm) and (93.1 nm) and lattice strain (4.2 x10−4 ) and (21x10−4) respectively. Also, other methods have been employed to evaluate the crystallite size. The current methods are (Sherrer and modified Sherrer methods ) and their results are (14.8 nm) and (13.9nm) respectively. Each method of analysis has a different result because the alteration in the crystallite size and lattice strain calculated according to the Williamson-Hall and size-strain plot methods shows that the non-uniform strain in nanoparticles.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Sep 01 2012
Journal Name
2012 International Conference On Statistics In Science, Business And Engineering (icssbe)
A proposal method for selecting smoothing parameter with missing values
...Show More Authors

In this paper we proposed a new method for selecting a smoothing parameter in kernel estimator to estimate a nonparametric regression function in the presence of missing values. The proposed method is based on work on the golden ratio and Surah AL-E-Imran in the Qur'an. Simulation experiments were conducted to study a small sample behavior. The results proved the superiority the proposed on the competition method for selecting smoothing parameter.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Sep 01 2007
Journal Name
Al-khwarizmi Engineering Journal
A Fully Computerized Method to Backup the Router Configuration File
...Show More Authors

This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.

    The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Preparation and Characterization of a Hierarchically Porous Zeolite-Carbon Composite from Economical Materials and Green Method
...Show More Authors

Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Preparation and Characterization of a Hierarchically Porous Zeolite-Carbon Composite from Economical Materials and Green Method
...Show More Authors

A hierarchically porous structured zeolite composite was synthesized from NaX zeolite supported on carbonaceous porous material produced by thermal treatment for plum stones which is an agro-waste. This kind of inorganic-organic composite has an improved performance because bulky molecules can easily access the micropores due to the short diffusion path to the active sites which means a higher diffusion rate. The composite was prepared using a green synthesis method, including an eco-friendly polymer to attach NaX zeolite on the carbon surface by phase inversion. The synthesized composite was characterized using X-ray diffraction spectrometry, Fourier transforms infrared spectroscopy, field emission scanning electron microscopy, energy d

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Validity of Generalized Standard Addition Method for a Mixture of Amino Acid Analysis
...Show More Authors

A Modified version of the Generlized standard addition method ( GSAM) was developed. This modified version was used for the quantitative determination of arginine   (Arg) and glycine ( Gly) in arginine  acetyl salicylate – glycine complex . According to this method two linear equations were solved to obtain the amounts of (Arg) and (Gly). The first equation was obtained by spectrophotometic measurement of the total absorbance of (Arg) and (Gly) colored complex with ninhydrin . The second equation was obtained by measuring the total acid consumed by total amino groups of (Arg) and ( Gly). The titration was carried out in non- aqueous media using perchloric acid in glacial acetic acid as a titrant. The developed metho

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 02 2022
Journal Name
Journal Of Legal Sciences
Expropriation of foreign investments - a comparative study
...Show More Authors

The right to property is one of the most prominent and most important of the fundamental rights that the individual enjoys, whether national or foreign, both of them have their own private property that may not be affected except for the requirements of the country's economic development or what is known as the public benefit, and the Iraqi legislator did not specify what is meant by the removal of foreign investment. Of the bilateral international agreements (BITS), as it determined its terms and methods, the properties of foreign investors may be expropriated in a direct and indirect way.

View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Study the Structural and Optical Properties of Cr doped SnO2 Nanoparticles Synthesized by Sol-Gel Method
...Show More Authors

View Publication
Scopus (54)
Crossref (49)
Scopus Clarivate Crossref
Publication Date
Wed Jun 27 2018
Journal Name
Iraqi Journal Of Science
Theoretical Study of Density Distributions and Size Radii of 8B and 17Ne
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref