Preferred Language
Articles
/
lRdcUZABVTCNdQwCZ4ZC
Multipole Mixing Ratios of Gamma Rays From Fe(n,ny Reaction Using Constant Statistical Tensor Method (CST).
...Show More Authors

The - M ultiple mixing ratios of -transitions from levels of 56Fe populated in 56 56 Fe n n Fe ( , )  reactions are calculated by using const. S.T.M. This method has been used in other works [3,7] but with pure transition or with transitions that can be considered as pure transitions، in our work we used This method for mixed  - transitions in addition to pure  - transitions. The experimental angular distribution coefficients a2 was used from previous works [1] in order to calculet - values. It is clear from the results that the - values are in good agreement or consistent, within associated errors, with those reported previously [1]. The discrepancies that occur are due to inaccuracies existing in the experimental data of the previous works. The present work results confirm the validities of C.S.T.M. in calculating the -mixing ratios and their capabilities in predicting any inaccuracy in the experimental data and C.T.T.M. for mixed transition which are better than C.T.T.M. for pure transitions because it depends only on the experimental results while the 2nd method depends on pure and that which can be considered to be pure transitions.

Publication Date
Mon Jan 01 2018
Journal Name
Eco Env And Cons
Histological changes resulting from the use of sublethal concentrations from insecticide.....
...Show More Authors

.

Publication Date
Mon Jan 11 2016
Journal Name
مجلة كلية التربية الاساسية
Synthesis and Characterization of Some Metal Complexes of [4- chloro-N- 1,5-dimethy l-3-oxo-2- phenyl-2,3-dihydro-1H-pyrazol-4- ylcarbamothioyl(benzamide)
...Show More Authors

A new ligand [4-chloro-N-(1,5-dimethyl-3-oxo-2-phenyl-2,3- dihydro-1H-pyrazol-4-ylcarb amothioyl) benzamide] (CAP) was synthesized by reaction of P-ChloroBenzoyl isothio cyanate with 4- aminoantipyrine,The ligand was characterized by micro elemental analysis C.H.N.S.,FT-IR,UV-Vis and1H13CNMR spectra, some transition metals complex of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption. From the obtained results the molecular formula of all prepared complexes were [M(CAP)2(H2O)2]Cl2(M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg),the proposed geometrical structure for all complexes were octahedral

Publication Date
Fri Jan 01 2016
Journal Name
Journal University Of Kerbala
Synthesis and Characterization of Some Metal Complexes of [2-chloro-N-(1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylcarbamothioyl)acetamide] (L)
...Show More Authors

A new ligand [ 2-chloro-N- (1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro -1H-pyrazol- 4-ylcarbamothioyl)acetamide](L) was synthesized by reacting the Chloro acetyl isothiocyanate with 4-aminoantipyrine,The ligand was characterized by(C HNS) elemental microanalysis and the spectral measurements including Uv-Vis ,IR ,1H and13C NMR spectra, some transition metals complex of this ligand were prepared and characterized by Uv-Vis, FT-IR spectra, conductivity measurements, magnetic susceptibility and atomic absorption. From the obtained results the molecular formula of all prepared complexes were [M(L)2(H2O)2]Cl2 (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg),the proposed geometrical structure for all complexes were octahedral.

Publication Date
Mon Jun 30 2025
Journal Name
Iraqi Journal Of Science
New Weighted Synthetic Oversampling Method for Improving Credit Card Fraud Detection
...Show More Authors

The use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Advanced Computer Science And Applications
Achieving Flatness: Honeywords Generation Method for Passwords based on user behaviours
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sun May 01 2016
Journal Name
2016 Al-sadeq International Conference On Multidisciplinary In It And Communication Science And Applications (aic-mitcsa)
Landsat-8 (OLI) classification method based on tasseled cap transformation features
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jul 20 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Analytical solutions via coupled Elzaki adomian decomposition method for some applications
...Show More Authors

An efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has

... Show More
Scopus (4)
Scopus
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
A Proposed Analytical Method for Solving Fuzzy Linear Initial Value Problems
...Show More Authors

     In this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements  and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 04 2018
Journal Name
Journal Of Electrical Engineering And Technology
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

View Publication
Scopus (8)
Scopus