Preferred Language
Articles
/
jih-1665
Charge Transfer Between d-p States in Ti02 By Employing Compton Scattering Techniques
...Show More Authors

The com pton profiles for Ti02 have been measured using a SCi

Am-241 compton spectrometer .A pellet of the oxide was prepared from a polycrystalline powder    having a thickness of 1.54 mm ,about J 00000  counts   have   been  accumulated   at   the  compton   peak

.Theoreti cal compton profiles have been calculated for different ionic anangements using free atom compton profile for the core electrons.The   theoretical  and  experimental  results  ahrce  well  for (Ti/4(0 .2    arrangement which support complete transfer of valence electrons from metal to oxygen ions, i.e., full ionic  bonding in this oxide in agreement with available pbotoemission and other studies .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Mural Photography Techniques: منى حيدر علي
...Show More Authors

The study aimed to study the role of technology in the production of the mural photography, and to develop its concept to the viewer, through the achievement of the aesthetic and functional vision. Through this study, some types of these techniques, which are organically related to architecture, were identified.

The mural photography includes a huge amount of techniques, and methods, and the researcher presented them through five techniques: (AlTamira, Alfresk, acrylic, mosaic, and glass art, which takes the architectural character.

The research consists of:

Methodological framework: research problem, research objectives, research limits, importance of research, and definition of terms.

Theoretical framewo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Science
Determination of Differential Cross-Section of (n+89Y) Elastic and Inelastic Scattering using Eikonal Approximation
...Show More Authors

     Neutron differential-elastic and inelastic scattering cross-sections of Yttrium-89 isotope were calculated at energies 8,10,12,14, and 17 MeV, at angles distributed between 20o and 180o in the center of mass frame. The obtained results data were interpreted using a spherical optical potential model and Eikonal approximation, to examine the effect of the first-order Eikonal correction on the effective potential. The real and imaginary parts of optical potential were calculated. It was found that the nominal imaginary potential increase monotonically while the effective imaginary one has a pronounced minimum around r = 6fm and then increases. The analysis of the relative energy of the projectile and reaction

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The effect of phonons-surface and grain-boundary scattering on electrical properties of metallic Ag
...Show More Authors

Explain in this study, thickness has an inverse relationship with electrical resistivity and a linear relationship with Grain boundary scattering. According to the (Fuchs-Sondheier, Mayadas-Shatzkces) model, grain boundary scattering leads To an Increase in electrical Resistivity. The surface scattering Coefficient  of Ag, which Fuchs-Sondheier and Mayadas-Shatzkces measured at , Ag's grain boundary reflection coefficient , which Mayadas-Shatzkces measured at , If the concentration of material has an effect on metal's electrical properties, According to this silver is a good electrical conductor and is used frequently in electrical and electronic circuits.

View Publication Preview PDF
Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Nucleon momentum distributions and elastic electron scattering form factors for 50Cr, 52Cr and 54Cr isotopes
...Show More Authors

In the framework of correlation method so-called coherent density fluctuation model (CDFM) the nucleon momentum distributions (NMD) of the ground state for some even mass nuclei of fp-shell like 50Cr, 52Cr and 54Cr isotopes are examined. Nucleon momentum distributions are expressed in terms of the fluctuation function (|f(x)|2) which is evaluated by means of the nucleon density distributions (NDD) of the nuclei and determined from theory and experiment. The main characteristic feature of the NMD obtained by CDFM is the existence of high-momentum components, for momenta k ≥ 2 fm−1. For completeness, also elastic electron scattering form factors, F(q) are evaluated within the same framework.

View Publication Preview PDF
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Electron Scattering from Some Fp- Shell Nuclei with Inclusion the Effect of Short-Range Correlation
...Show More Authors

The effects of short-range correlation on elastic Coulomb (charge) form factors, charge density distributions as well as root mean square charge radii of various  nuclei (for instance, 46, 48, 50Ti, 52, 54Cr, 56, 58Fe, and 72, 74, 76Ge nuclei) are examined. The one- and two body terms of the cluster expansion together with the single-particle harmonic oscillator wave functions are utilized. For the purpose of embedding these effects into the formulae of charge density  and form factor  we employ the correlation function of Jastrow-type. These formulae depend upon the short-range correlation parameter  (which instigates from the Jastr

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Proceedings Of The 17th Laccei International Multi-conference For Engineering, Education, And Technology: “industry, Innovation, And Infrastructure For Sustainable Cities And Communities”
Type Curve Techniques for Hydraulically Fractured Wells in Tight Gas Reservoir
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
A Review of Assured Data Deletion Security Techniques in Cloud Storage
...Show More Authors

      Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Apr 04 2024
Journal Name
Chemchemtech
ANALYTICAL TECHNIQUES IN PHARMACEUTICAL POLLUTION OF THE WORLD’S RIVERS; A REVIEW
...Show More Authors

Recent reports of new pollution issues brought on by the presence of medications in the aquatic environment have sparked a great deal of interest in studies aiming at analyzing and mitigating the associated environmental risks, as well as the extent of this contamination. The main sources of pharmaceutical contaminants in natural lakes and rivers include clinic sewage, pharmaceutical production wastewater, and sewage from residences that have been contaminated by drug users' excretions. In evaluating the health of rivers, pharmaceutical pollutants have been identified as one of the emerging pollutants. The previous studies showed that the contaminants in pharmaceuticals that are widely used are non-steroidal anti-inflammatory drugs, ant

... Show More
Scopus (2)
Scopus