Preferred Language
Articles
/
jih-1790
Theoretical Evaluations of Probability of Photons Yield Depending on Quantum Chromodynamics Theory
...Show More Authors

      Aim of this research is the description with evaluation the photons rate probability at quark-gluon reactions processes theoretically depending on quantum color theory. In high energy physics as well as quantum field theory and quantum chromodynamics theory,they are very important for physical processes. In quark–gluon interaction there are many processes, the Compton scattering, annihilation pairs and quark–gluon plasma. There are many quantum features, each of three  and systems that taken which could make a quark–gluon plasma in character system. First, electric quark charge and color quantum charge that’s satisfied by quantum number. Second, the critical temperature and photon energy. Moreover, for such three systems have variety quantum flavor numbers: 2, 3 and 4, the photons rate are evaluated at system energy limited  with critical temperature: 144 MeV. However, due to the quark–gluon plasma producing in heavy ions collisions, the photons rate is   increasing with decreasing of coupling constant and photons energy in quark-quark interaction systems.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Comparison of Single and Group Jet Grout Columns Settlement Based on Field Test and Theoretical Methods
...Show More Authors
Abstract<p>The settlement evaluation for the jet grouted columns (JGC) in soft soils is a problematic matter, because it is influenced by the number of aspects such as soil type, effect mixture between soil and grouting materials, nozzle energy, jet grouting, water flow rate, rotation and lifting speed. Most methods of design the jet-grouting column based on experience. In this study, a prototype single and group jet grouting models (single, 1*2, and 2*2) with the total length and diameter were (2000 and 150 mm) respectively and clear spacing (3D) has been constructed in soft clay and subjected to vertical axial loads. Furthermore, different theoretical methods have been used for the estimation </p> ... Show More
View Publication
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Social Science Journal
Development Theory of Women's Empowerment in Islamic Sharia Law
...Show More Authors

The research, entitled: "The Development Theory of Women's Empowerment in Islamic Sharia Law ", aims to show the means of human development for women through the texts of the Quran and Sunnah. It talked about the concept of human development for women, the goals of women's empowerment in legislative texts, the goals of human development in empowering women, the developmental aspect of women in the Sunnah of the Prophet, the integration of development in Islamic Sharia Law , and then the conclusion and sources.

View Publication
Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Category Theory and New Classes of Semi Bornological Group
...Show More Authors

Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
SURVEYS MEASUREMENT OF PUBLIC OPINION BETWEEN THEORY AND PRACTICE
...Show More Authors

The majority of statisticians, if not most of them, are primarily concerned with the theoretical aspects of their field of work rather than their application to the practical aspects. Its importance as well as its direct impact on the development of various sciences. Although the theoretical aspect is the first and decisive basis in determining the degree of accuracy of any research work, we always emphasize the importance of the applied aspects that are clear to everyone, as well as its direct impact on the development of different sciences. The measurements of public opinion is one of the most important aspects of the application of statistics, which has taken today, a global resonance and has become a global language that everyone can

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 10 2020
Journal Name
Journal Of Advances In Mathematics
A Study of The Density Property in Module Theory
...Show More Authors

In this paper, there are two main objectives. The first objective is to study the relationship between the density property and some modules in detail, for instance; semisimple and divisible modules. The Addition complement has a good relationship with the density property of the modules as this importance is highlighted by any submodule N of M has an addition complement with Rad(M)=0. The second objective is to clarify the relationship between the density property and the essential submodules with some examples. As an example of this relationship, we studied the torsion-free module and its relationship with the essential submodules in module M.

Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Study of Graph Theory Applications in IT Security
...Show More Authors

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Re

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Use some probability amputated models to study the characteristics of health payments in the Iraqi Insurance Company
...Show More Authors

 

Abstract

Due to the lack of previous statistical study of the behavior of payments, specifically health insurance, which represents the largest proportion of payments in the general insurance companies in Iraq, this study was selected and applied in the Iraqi insurance company.

In order to find the convenient model representing the health insurance payments, we initially detected two probability models by using (Easy Fit) software:

First, a single Lognormal for the whole sample and the other is a Compound Weibull  for the two Sub samples (small payments and large payments), and we focused on the compoun

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
Hybrid Methodology for Image Segmentation Based on Active Contour Module and Alpha-Shape Theory
...Show More Authors

The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s

... Show More
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Engineering
Stator Faults Diagnosis and Protection in 3-Phase Induction Motor Based on Wavelet Theory
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Generating dynamic S-BOX based on Particle Swarm Optimization and Chaos Theory for AES
...Show More Authors

Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm  in order to remove these weakness points, Will be generated dynamic substitution box (S-B

... Show More
View Publication Preview PDF