Preferred Language
Articles
/
jih-2891
Using the Size Strain Plot Method to Specity Lattice Parameters
...Show More Authors

X-ray diffractometers deliver the best quality diffraction data while being easy to use and adaptable to various applications. When X-ray photons strike electrons in materials, the incident photons scatter in a direction different from the incident beam; if the scattered beams do not change in wavelength, this is known as elastic scattering, which causes amplitude and intensity diffraction, leading to constructive interference. When the incident beam gives some of its energy to the electrons, the scattered beam's wavelength differs from the incident beam's wavelength, causing inelastic scattering, which leads to destructive interference and zero-intensity diffraction. In this study, The modified size-strain plot method was used to examine the pattern of x-ray diffraction lines (101),(121),(202),(042), and (242) for calcium titanate(CaTiO3) nanoparticles in this study. To calculate the new variables, the size strain plot method was created., X-ray line analysis and calculation of crystal size and lattice tension of calcium titanate oxide nanoparticles. It is used to calculate the crystal volume (44.7 nm) and to calculate the determination of network parameters such as the texture modulus (Tc), macro stress (MS), specific surface area (SSA), and dislocation density(η), respectively.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Using Bernoulli Equation to Solve Burger's Equation
...Show More Authors

In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud
...Show More Authors

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Apr 14 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
The Effect of Using Ginger (Zingiber officinale) to Prevente Salmonella typhi. in Some Food Products.: The Effect of Using Ginger (Zingiber officinale) to Prevente Salmonella typhi. in Some Food Products.
...Show More Authors

This study was conducted in order to statement the effect of ginger (Zingiber officinale) extracts in reducing the presence of the bacterium Salmonella typhimurium in some foods products.
Qualitative disclosures effective chemical compounds (alkaloids, flavonoids, phenols, tannins, terpenes) showed that the extracts of ginger an effective compounds as follows: oil extract and fresh juice> aqueous extract warm> aqueous extract cold. And studied the impact extract of fresh ginger juice, hot water ,cold water and oil rates extracts (1,2,3)% in bacteria test has shown that all s of extracts clear impact inhibition has oily extract of ginger recorded the highest value to inhibition zone reaching 35 mm when the concentration of 3%, f

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 15 2022
Journal Name
Alustath Journal For Human And Social Sciences
The Effectiveness of Counseling on Using the Technique of ‎Positive Self-talk to Develop the Habits of Mind Among Secondary ‎School Students
...Show More Authors

This research aims to identify the effectiveness of counseling by using the technique of self-talkin developing the habits of mind among middle school students by testing important hypotheses, and choosing the experimental design for the two groups (experimental - control). The classification of "Costa & Kallick" was adopted to measure the habits of the mind, and the scale consisted of (64) items, and after confirming the psychometric properties of the scale, the researcher applied it to the research sample (487) students from middle school students. One of the students who got the lowest marks after answering the scale. purpose of applying the experiment. He divided them into two groups, one of them is experimental (10) students, as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 02 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Using the wavelet analysis to estimate the nonparametric regression model in the presence of associated errors
...Show More Authors

Abstract The wavelet shrink estimator is an attractive technique when estimating the nonparametric regression functions, but it is very sensitive in the case of a correlation in errors. In this research, a polynomial model of low degree was used for the purpose of addressing the boundary problem in the wavelet reduction in addition to using flexible threshold values in the case of Correlation in errors as it deals with those transactions at each level separately, unlike the comprehensive threshold values that deal with all levels simultaneously, as (Visushrink) methods, (False Discovery Rate) method, (Improvement Thresholding) and (Sureshrink method), as the study was conducted on real monthly data represented in the rates of theft crimes f

... Show More
Publication Date
Wed Apr 29 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
The Reliability of Orthodontic Treatment, According to the Needs of Patients Using the Dental Aesthetic Index
...Show More Authors

Abstract Objectives: Malocclusion was and remains one of the most common problems which affects the psyche and social status of the individual, so the estimation of the malocclusion severity and needs a percentage of orthodontic treatment of Iraqi patients is the aim of this study. Method: A randomly selected 150 pairs of study models (48 male and 102 female) were involved in this study for patients attending an orthodontic clinic at College of Dentistry/ University of Baghdad seeking for treatment. The DAI scores were collected according to WHO guidelines directly from the study model with a digital caliper, score was calculated using the regression equation of 10 occlusal traits. The dental casts were classified into four groups to determ

... Show More
View Publication
Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Iraqi Journal Of Physics
Study of electron energy distribution function and transport parameters for CF4, Ar gases mixture discharge by using the solution of Boltzmann equation-Part II
...Show More Authors

The Boltzmann transport equation is solved by using two- terms approximation for pure gases and mixtures. This method of solution is used to calculate the electron energy distribution function and electric transport parameters were evaluated in the range of E/N varying from . 172152110./510.VcmENVcm
The electron energy distribution function of CF4 gas is nearly Maxwellian at (1,2)Td, and when E/N increase the distribution function is non Maxwellian. Also, the mixtures are have different energy values depending on transport energy between electron and molecule through the collisions. Behavior of electrons transport parameters is nearly from the experimental results in references. The drift velocity of electron in carbon tetraflouride i

... Show More
View Publication Preview PDF