Preferred Language
Articles
/
lxdeUZABVTCNdQwC5YZi
Evaluation of The Nuclear Data on(α,n)Reaction for Natural Molybdenum
...Show More Authors

The cross section evaluation for (α,n) reaction was calculated according to the available International Atomic Energy Agency (IAEA) and other experimental published data . These cross section are the most recent data , while the well known international libraries like ENDF , JENDL , JEFF , etc. We considered an energy range from threshold to 25 M eV in interval (1 MeV). The average weighted cross sections for all available experimental and theoretical(JENDL) data and for all the considered isotopes was calculated . The cross section of the element is then calculated according to the cross sections of the isotopes of that element taking into account their abundance . A mathematical representative equation for each of the element and their isotopes are "formulated" they represent the variation of the cross section with energy . The evaluated (α,n) cross sections which was used to calculate the neutron yield for (Mo) for the first time ,which are very important in nuclear technology .

Publication Date
Wed Jul 02 2025
Journal Name
Al-nahrain Journal For Engineering Sciences
The Effect of Magnetic Abrasive Finishing on the Flat Surface for Ferromagnetic and non-Ferromagnetic materials
...Show More Authors

Magnetic Abrasive Finishing (MAF) is an advanced finishing method, which improves the quality of surfaces and performance of the products. The finishing technology for flat surfaces by MAF method is very economical in manufacturing fields an electromagnetic inductor was designed and manufactured for flat surface finishing formed in vertical milling machine. Magnetic abrasive powder was also produced under controlled condition. There are various parameters, such as the coil current, working gap, the volume of powder portion and feed rate, that are known to have a large impact on surface quality. This paper describes how Taguchi design of experiments is applied to find out important parameters influencing the surface quality generated during

... Show More
View Publication
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Public Spending on Kaldor's Square Variables in Iraq for the period (2005-2016).
...Show More Authors

The paper aims to measure and analysis the impact Public Spending on Iraq economy (Kaldor Variables).

 (variables of the magic square Kaldor) and them in after 2003.

The paper adopted econometric Methods to test the stationarity of the Variables under consideration. For the period (2005-2016) by using multiple regression and estimation the Impulse response function (IRF), by adopting Eviews 10 program.

The results of Impulse response function for the following five-years after the period under consideration reflexes that public expenditure (PEX) was fluctuating between positive and negative in all the variables of the research and this shows the fragility of the performance of fiscal policy in Iraq.

T

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluation of Rosuvastatin Effect as Adjuvant Therapy to Methotrexate on Lipid Profile and the Possibility of its Cardioprotective Effect in Iraqi Patients with Active Rheumatoid Arthritis
...Show More Authors

Rheumatoid arthritis (RA) is a common inflammatory disease that associated with increased morbidity and mortality due to accelerated atherosclerosis. Rosuvastatin is a unique hydroxy methyl glutaryl Co A (HMGCoA) reductase inhibitor that has anti inflammatory effects.

The aim of this study was to evaluate the effect of rosuvastatin as adjuvant therapy to methotrexate (MTX) on lipid profile and its possible cardioprotective effect in RA patients. A double blinded placebo controlled clinical trial with 8 weeks follow up periods at which 40 patients with active RA using MTX were randomized into 2 groups to receive either rosuvastatin 10mg or placebo as adjuvant therapy to MTX. In addition to twenty healthy subjects as control group.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Saudi Medical Journal
Serum anti-müllerian hormone levels in evaluation of chemotherapy effect on ovarian reserve in women with breast cancer
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Feb 05 2023
Journal Name
Engineering, Technology & Applied Science Research
Performance Evaluation of Emulsion Liquid Membrane on Chlorpyrifos Pesticide Removal: Stability, Mass Transfer Coefficient, and Extraction Efficiency Studies
...Show More Authors

Emulsion Liquid Membrane (ELM) is an emerging technology that removes contaminants from water and industrial wastewater. This study investigated the stability and extraction efficiency of ELM for the removal of Chlorpyrifos Pesticide (CP) from wastewater. The stability was studied in terms of emulsion breakage. The proposed ELM included n-hexane as a diluent, span-80 as a surfactant, and hydrochloric acid (HCl) as a stripping agent. Parameters such as mixing speed, aqueous feed solution pH, internal-to-organic membrane volume ratio, and external-to-emulsion volume ratio were investigated. A minimum emulsion breakage of 0.66% coupled with a maximum chlorpyrifos extraction and stripping efficiency were achieved at 96.1% and 95.7% at b

... Show More
Crossref (2)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Wed Oct 02 2024
Journal Name
International Development Planning Review
DESIGNING AN AUXILIARY DEVICE AND ITS IMPACT ON LEARNING THE SKILLS OF ANGULAR SUPPORT AND OPEN SUPPORT FOR HANDSTAND PUSH-UPS ON THE PARALLEL APPARATUS IN ARTISTIC GYMNASTICS FOR BUDS
...Show More Authors