The cross section evaluation for (α,n) reaction was calculated according to the available International Atomic Energy Agency (IAEA) and other experimental published data . These cross section are the most recent data , while the well known international libraries like ENDF , JENDL , JEFF , etc. We considered an energy range from threshold to 25 M eV in interval (1 MeV). The average weighted cross sections for all available experimental and theoretical(JENDL) data and for all the considered isotopes was calculated . The cross section of the element is then calculated according to the cross sections of the isotopes of that element taking into account their abundance . A mathematical representative equation for each of the element and their isotopes are "formulated" they represent the variation of the cross section with energy . The evaluated (α,n) cross sections which was used to calculate the neutron yield for (Mo) for the first time ,which are very important in nuclear technology .
In this study, investigations of structural properties of n-type porous silicon prepared by laser assisted-electrochemical etching were demonstrated. The Photo- electrochemical Etching technique, (PEC) was used to produce porous silicon for n-type with orientation of (111). X-ray diffraction studies showed distinct variations between the fresh silicon surface and the synthesized porous silicon surfaces. Atomic force microscopy (AFM) analysis was used to study the morphology of porous silicon layer. AFM results showed that root mean square (RMS) of roughness and the grain size of porous silicon decreased as etching current density increased. The chemical bonding and structure were investigated by using fourier transformation infrared spec
... Show MoreShiranish formation has been divided into two microfacies units: 1 - Many biowackestone facies and 2 - maly packstone using planktonic foraminifera and other carbonate components in the rock cutting and core slides. Microfacies reflect marin deep shelf margin in the lower part of the formation, the upper part was deeper. The thickness of the formation is determined, depending on addition to the presence of echinoderm framents debris and spines. This is in disagreement with the 195 ft thickness reported by the Oil Exploration Company The age of the formation is estimated depending on the recognized biostratigraphic zone using the index fossils to be Upper - Middle Mastrichtion.
The aim of this study is to investigate the role of prodigiosin on P. aeruginosa' s biofilm genes involved in the pathogenicity and persistency of the bacteria; Materials and methods: Gram negative bacterial isolates were taken from burn and wounds specimen obtained from some of Baghdad hospitals. Forty six isolates were identified as Pseudomonas aeruginosa and four isolates as Serratia marcescens by using biochemical tests and VITEK 2 compact system. Susceptibility test was performed for all P. aeruginosa isolates, the results showed that 100% were resistant to Amikacin and 98% were sensitive to Meropenem. Resistant isolates were tested for biofilm formation; the strong and moderate isolates (17) were detected by PCR for AlgD gene
... Show MoreBackground: Apicoectomy and retrograde filling is indicated when conventional endodontic treatment is impossible or failed to achieve apical seal. The aim of this study was to evaluate the effect of ER: YAG laser on apical microleakage. Materials and Methods: Sixty extracted single-rooted teeth were used in this study. The roots were divided into six groups. Group 1: apicoectomy by fissure bur, and apical cavities prepared by round bur, then cavities were filled with MTA. Group 2: the roots preparations and fillings were the same as group 1, then the apical areas were treated by Er:YAG Laser. Group 3: apicoectomy by fissure bur, and apical cavities prepared by ultrasound retrotip and cavities were filled with MTA. Group 4: the roots prepara
... Show MoreIn an attempt to disposal from nuclear waste which threats our health and environments. Therefore we have to find appropriate method to immobilize nuclear waste. So, in this research the nuclear waste (Strontium hydroxide) was immobilized by Carbon nanotubes (CNTs). The Nd-YAG laser with wave length 1064 nm, energy 750 mJ and 100 pulses used to prepare CNTs. After that adding Sr(HO)2 powder to the CNTs colloidal in calculated rate to get homogenous mixing of CNTs-Sr(OH)2. The Sr(HO)2 absorbs carbon dioxide from the air to form strontium carbonate so, the new solution is CNTs-SrCO3. To dry solution putting three drops from the new solution on the glass slides. To investigate the radi
... Show MoreBackground: Wounds are any disruption to the normal anatomic structure of tissue which leads to the loss of epithelial continuity with or without a loss of underlying connective tissue, as well as the anatomic and functional integrity of the living tissue . Wound healing is a complex process with overlapping phases haemostasis, inflammation, proliferation and maturation/matrix Remodeling. Each phase of wound healing requires different management strategies, and inappropriate treatment can delay wound healing. The aim of wound treatment is a rapid wound closure and re-establish tissue function,chia seeds oil are widely used herbal medicines because of their anti-inflammatory and antioxidant capacity as they considerd agood source of polyunsa
... Show Moren this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show MoreThis paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show MoreMeasuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show More