Preferred Language
Articles
/
jih-331
The Calculation of Binding Energies for Even-Even Mg(A=20,22,28 And 30) Isotopes
...Show More Authors

The rotational model symmetry is a strong feature of 1d shell nuclei, where symmetry breaking spin-orbital force is rather weak. The binding energies and low-lying energy spectra of Mg (A=20,22,28 and 30) even-even isotopes have been calculated. The interaction used contains the monopole-monopole, quadrupole-quadrupole and isospin dependent terms. Interaction parameters are fixed so as to reproduce the binding of 8 nucleons in N=8 orbit for Z=12 isotope.
 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
information and communication technologies and their impact on changed the financial reporting system In a Sample in Iraqi banks
...Show More Authors

paid recent developments in the information and communications technology and the accompanying developments in the global market to pay particular accounting information users to demand more sophistication in terms of corporate financial reporting systems, which led to the emergence of a new type of reporting (financial reporting in real time). where is the information and communications technology mainstay Nations for the development and progress, thanks to the development of technology that have made the transmission of information easily conducted and high speed to all who need it, communication is instantaneous and the flow of information via the internet dramatically exceeded the border temporal and spatial anywhere in the w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of The College Of Education For Women
Employment and Labor Union Laws in Japan between the 1889 and 1946 Constitutions: A Comparative Study: أفراح محمد علي
...Show More Authors

This research is based on the descriptive and analytical methodology. The importance of studying labor laws and labor unions in Japan between 1889 and 1946 constitutions is because Japan was out of a feudal phase, and had no idea about the factory system and industrialization in their modern sense before the Meiji era. Generally, its labor system used to be mostly familial, and the economic system was based on agriculture. This called for the enactment of legislations and laws appropriate for the coming phase in Meiji era. Thus, this paper examines the role of Meiji government in enacting labor legislations and laws when he came to power in 1896, and his new constitution in 1889 and the civil code of 1896. It further examines the way Mei

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Hypercyclictty and Countable Hypercyclicity for Adjoint of Operators
...Show More Authors

Let be an infinite dimensional separable complex Hilbert space and let , where is the Banach algebra of all bounded linear operators on . In this paper we prove the following results. If is a operator, then 1. is a hypercyclic operator if and only if D and for every hyperinvariant subspace of . 2. If is a pure, then is a countably hypercyclic operator if and only if and for every hyperinvariant subspace of . 3. has a bounded set with dense orbit if and only if for every hyperinvariant subspace of , .

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Effective Rules for Building and Securing of Blogs
...Show More Authors

Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
Improve studies and calculations for the Bose-Einstein condensation D-D fusion reaction rate
...Show More Authors

A theoretical study including the effects of the fusion characteristics parameters on the fundamental fusion rate for the BEC state in D-D fusion reaction is deal with varieties physical parameters such as the fuels density, fuel temperature and the astrophysics S-factor are processed to bring an approximately a comparable results to agree with the others previously studies.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 19 2016
Journal Name
Kufa Journal For Veterinary Medical Sciences
Pre and postnatal morphological developments for the skull bones in guinea pig (Cavia cutleri)
...Show More Authors

View Publication
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Engineering Research And Management
The first and Second Order Polynomial Models with Double Scalar Quantization for Image Compression
...Show More Authors

Publication Date
Fri Dec 29 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
How Do Parental Factors Increase the Probability for Autism and Attention Deficit Hyperactivity Disorder?
...Show More Authors

Two prevalent neurodevelopment disorders in children are attention deficit hyperactivity disorder (ADHD) and autism spectrum disorder (ASD). The fifth version of the Diagnostic and Statistical Manual of Mental Disorders describes autism as a condition marked by limitations in social communication as well as restricted, repetitive behavior patterns. While impulsivity, hyperactivity, and lack of concentration are signs of attention deficit hyperactivity disorder. Boys experience it more frequently than girls do. This study sought for possible factors that put children at risk for autism and attention deficit hyperactivity disorder, and it investigated the association between neurodevelopment disorders in children and parental risk factor i

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 28 2020
Journal Name
Iraqi Journal Of Science
Homotopy Perturbation Method and Convergence Analysis for the Linear Mixed Volterra-Fredholm Integral Equations
...Show More Authors

In this paper, the homotopy perturbation method is presented for solving the second kind linear mixed Volterra-Fredholm integral equations. Then, Aitken method is used to accelerate the convergence. In this method, a series will be constructed whose sum is the solution of the considered integral equation. Convergence of the constructed series is discussed, and its proof is given; the error estimation is also obtained. For more illustration, the method is applied on several examples and programs, which are written in MATLAB (R2015a) to compute the results. The absolute errors are computed to clarify the efficiency of the method.

View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref