The limited availability of the two-circle diffractometer to collect intensity measurements down to the monoclinic system has been extended in a novel procedure to collect intensities for the triclinic system. The procedure involves the derivation of matrix elements from graphical representation of the reciprocal lattice. Offset of the origins of the upper layers from that of the zero-layer - characteristic of triclinic system - is determined and the 3 x 3 matrix elements are evaluated accordingly. Details of crystal alignment by X-rays for the triclinic system utilizing the intensities of equivalent reflections is described
To find the effect of interaction of the two elements , phosphorus and zinc, in some of the characters of two varieties of wheat (Triticum aestivum Var. Intisar) (Triticum aestivum Var. Ipa 95), An experiment was conducted in pots in the green house of the Department of Biological Science. / College of Education (Ibn-Al-Hiatham), for the season 2007/2008 using three levels of Phosphorus (0, 400, 800, mg / pot) and four levels of zinc (0, 10, 15, 20 mg / pot). The experiment showed that the effect of the interaction of phosphorus and zinc was positive which increased the values of the features studied (length of plant, relative growth rate, nitrogen content, concentration of phosphorus and concentration of zinc) in the two varieties
... Show MoreObjectives: A cross sectional analytic study was carried out to identify the maternal risk factors which
contribute to occurrence of low birth weight, and to determine the statistical significant differences between low
birth weight and maternal risk factors.
Methodology: A purposive sample of (400) woman was selected from AL-Elwyia Maternity Teaching Hospital
and Fatima Al-Zaharia Maternity and Pediatric Teaching Hospital. Data was collected through the interview of
mothers. Questionnaire format was designed and consisted seven parts, demographic variables, and reproductive
variables , Reproductive health variables, complications during the current pregnancy, the mother newborn
variables nutritional status for the m
A numerical computation for determination transmission coefficient and resonant tunneling energies of multibarriers heterostructure has been investigated. Also, we have considered GaN/Al0.3Ga0.7N superlattice system to estimate the probability of resonance at specific energy values, which are less than the potential barrier height. The transmission coefficient is determined by using the transfer matrix method and accordingly the resonant energies are obtained from the T(E) relation. The effects of both well width and number of barriers (N) are observed and discussed. The numbers of resonant tunneling peaks are generally increasing and they become sharper with the increasing of N. The resonant tunneling levels are sh
... Show MoreA numerical computation for determination transmission coefficient and resonant tunneling energies of multibarriers heterostructure has been investigated. Also, we have considered GaN/Al0.3Ga0.7N superlattice system to estimate the probability of resonance at specific energy values, which are less than the potential barrier height. The transmission coefficient is determined by using the transfer matrix method and accordingly the resonant energies are obtained from the T(E) relation. The effects of both well width and number of barriers (N) are observed and discussed. The numbers of resonant tunneling peaks are generally increasing and they become sharper with the increasing of N. The resonant tunneling levels are shifted inside the well by
... Show MoreIn this paper, an eco-epidemiological prey-predator system when the predator is subjected to the weak Allee effect, and harvesting was proposed and studied. The set of ordinary differential equations that simulate the system’s dynamic is constructed. The impact of fear and Allee’s effect on the system's dynamic behavior is one of our main objectives. The properties of the solution of the system were studied. All possible equilibrium points were determined, and their local, as well as global stabilities, were investigated. The possibility of the occurrence of local bifurcation was studied. Numerical simulation was used to further evaluate the global dynamics and understood the effects of varying parameters on the asymptotic behavior of t
... Show MoreIn this work, thermodynamic efficiency of individual cell and stack of cells (two cells) has been computed by studying the variation of voltage produced during an operation time of 30 min as a result of the affected parameters:- stoichiometric feed ratio, flow field design on single cell and feed distribution on stack of cells. The experiments were carried out by using two cells, one with serpentine flow field and the other with spiral flow field. These cells were fed with hydrogen and oxygen at low volumetric flow rates from 1 to 2 ml/sec and stoichiometric ratios of fuel (H2) to oxidant (O2) as 1:2, 1:1 and 2:1 respectively. The results showed that
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show More