Preferred Language
Articles
/
jih-802
Evaluation of Thermal Reactor Fission Products Cross Sections
...Show More Authors

      The production of fission products during reactor operation has a very important effect on  reactor reactivity .Results of neutron cross section evaluations are presented for the main product nuclides considered as being the most important  for reactor calculation and burn-up consideration . Data from the main international libraries considered as containing the most up-to-date nuclear data   and the latest experimental measurements are considered in the evaluation processes, we describe the evaluated cross sections of the fission product nuclides by making inter comparison of the data and point out the discrepancies among libraries.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Physics: Conference Series
Simulation on Rotation Curve of Spiral Galaxies
...Show More Authors
Abstract<p>The problem of dark matter in galaxies is still one of the most important unsolved problems in the contemporary extragalactic astronomy and cosmology. The existence of a significant dynamic difference between the visible mass and the conventional mass of galaxies firmly establishes observational result. In this paper an unconventional explanation will be tested as an alternative to the cold dark matter hypothesis; which is called the modified Newtonian dynamics (MOND).</p><p>In this paper covers the simulation of galactic evolutions; where the two hypotheses are tested via the rotation curves. N-body simulation was carried adopting different configuration lik</p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi National Journal Of Chemistry
Adsorption of Cefixime on to Iraqi Bentonite
...Show More Authors

In this study the adsorption of cefixime on to selected Iraqi clay bentonite. The aim of this study is to search for selective active surface in adsorption of the drug and to act as physical antidotes in treatment of poisoning if the drug is taken in quantities higher than the recommended dosages. Quantitative estimation of the drug adsorption has been done by utilizing the technique of UV spectrophotometry in λmax (273) nm at different conditions of temperature (25, 37, 45) ˚C found the adsorption decrease with increase the temperature. Study of clay weight of bentonite (0.1-1.5) gm found the adsorption increase with increase of clay weight, study effect of pH (1.2, 3, 5, 7) on adsorption of bentonite found the optimum adsorption

... Show More
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Survey of Scale-invariant Feature Transform Algorithm
...Show More Authors

The effectiveness of detecting and matching of image features using multiple views of a specified scene using dynamic scene analysis is considered to be a critical first step for many applications in computer vision image processing. The Scale invariant feature transform (SIFT) can be applied very successfully of typical images captured by a digital camera.
In this paper, firstly the SIFT and its variants are systematically analyzed. Then, the performances are evaluated in many situations: change in rotation, change in blurs, change in scale and change in illumination. The outcome results show that each algorithm has its advantages when compared with other algorithms

View Publication Preview PDF
Publication Date
Thu May 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Some Types of Compactness in Bitopological Spaces
...Show More Authors

  In this paper, we give the concept of N-open set in bitopological spaces, where N is the first letter of the name of one of the authors, then we used this concept to define a new kind of compactness, namely N-compactness and we define the N-continuous function in bitopological spaces.         We study some properties of N-compact spaces, and the relationships between this kind and two other known kinds which are S-compactness and pair-wise compactness.

View Publication Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Multi-wavelength studies of NGC 4425 Galaxy
...Show More Authors

In this work, ugzri images of NGC 4425 galaxy are analyzed. The galaxy images are obtained from the seventh Sloan Digital Sky Survey (SDSS) Data Release (DR7). This work was performed with Image Reduction and Analysis Facility (IRAF) and analyzed the structure of the galaxy a bulge, a bar, together with isophotal contour maps and performed a bulge/disk decomposition of the galaxy image. Also, we have estimated the disk position angle, ellipticity, B4 and inclination of the galaxy.

View Publication Preview PDF
Publication Date
Sun Jul 02 2006
Journal Name
Journal Of The Faculty Of Medicine Baghdad
endoscopic management of common bile duct stones
...Show More Authors

backgroubd

View Publication Preview PDF
Crossref
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
Comparing the Main Approaches of Image Segmentation
...Show More Authors

Images are important medium for conveying information; this makes improvement of image processing techniques also important. Interpretation of image content is one of the objectives of image processing techniques. Image interpretation that segments the image to number of objects called image segmentation. Image segmentation is an important field to deal with the contents of images and get non overlapping regions coherent in texture and color, it is important to deal only with objects with significant information. This paper presents survey of the most commonly used approaches of image segmentation and the results of those approaches have been compared and according to the measurement of quality presented in this paper the Otsu's threshol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Misuse of appetite- stimulant drugs in Babylon#
...Show More Authors

Drug misuse is defined as using of drugs for a non-therapeutic or non-medical purpose. In Iraq drug misuse is a major problem because almost any drug can be easily obtained from pharmacies. Appetite- stimulant drugs are example of drugs that are widely used without a prescription. The study included 230 patients who use these drugs in Babylon. A questionnaire included the following questions ; age, sex, marital state, the reason for use the drug , whether the drug is prescribed by physician or not , type of drug used , the frequency of daily dose and lastly the extent of side effects of the drugs used. The results showed that the age range of 35% of subjects were (17-21) years old and 70% of participants were females. The study also show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Synthesis of New Amide and ThioUrease Compounds.
...Show More Authors

The reaction of some new Schiff bases ( 2-[(2-Amino – ethylimino)-methyl]-R , 2-({2-[(R-benzylidene)-amino]-ethylimino}-methyl)-R with Benzoyl chloride or Acetyl chloride were carried out. Subsequent reactions of these products N-(2-Amino-ethyl)-N-[Chloro-(R) –methyl]-benzamide or N-(2-{?-[chloro-(R) –methyl]-amino}-ethyl)-N-[chloro-(R) –methyl]- benzamide with thiourea afforded thioureas compounds. The synthesized compounds were confirmed by their IR,UV,spectra and C.H.N. analysis.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More