The radial wave functions of the generalised Woods–Saxon (GWS) potential within the two-body model of (Core + n) have been used to study the ground-state density distributions of protons, neutrons and matter and the associated root mean square (rms) radii of neutron-rich 14B, 22N, 23O and 24F halo nuclei. The calculated results show that the radial wave functions of the generalised Woods–Saxon potential within the two-body model succeed in reproducing neutron halo in these exotic nuclei. Elastic electron scattering form factors for these nuclei are studied by combining the charge density distributions with the plane-wave Born approximation (PWBA).
In order to take measures in controlling soil erosion it is required to estimate soil loss over area of interest. Soil loss due to soil erosion can be estimated using predictive models such as Universal Soil Loss Equation (USLE). The accuracy of these models depends on parameters that are used in equations. One of the most important parameters in equations used in both of models is (C) factor that represents effects of vegetation and other land covers. Estimating land cover by interpretation of remote sensing imagery involves Normalized Difference Vegetation Index (NDVI), an indicator that shows vegetation cover. The aim of this study is estimate (C) factor values for Part of Baghdad city using NDVI derived from satellite Image of Landsat-7
... Show MoreBackground:As arelationshipbetween gingivitis disease and the presence of the oral protozoa Trichomonastenax has been represented byconsiderable differences among various study population.The purpose of present study is determining the prevalence of T.tenax in patients with gingivitis and healthy subjects. Subjects,Materials and Methods:The presence of the parasite has been diagnosed with 58 patients withgingivitisand 58 healthy persons during the period of the study(April and May 2015) by taken two swabs for each one,microscopic examination was done using saline wet mount method and stained method. Age, sex and brushing teeth habit were in a count. Statistical analysis was done by SPSS program. Results:Gingivitis disease was observed in 5
... Show MoreAfter about twelve months or maybe more, some people can’t achieve pregnancy. This might be a sign of infertility as a reproductive system disease. The following study was carried out to investigate the DAZ 1 gene methylation level and its association with azoospermia in Iraqi patients. One hundred and fifty human blood samples were collected from from different regions in Baghdad governorate, including (private medicals Labs and the high institute for infertility diagnosis assisted reproductive techniques and Kamal Al- Samara'ay IVF Hospital) from both fertile and infertile men. The control group consists of 50 samples ranging from 22 to 51 years old, while the patient (infertile group) consists of 100 samples ranging between 25 and 51 y
... Show MoreCopper electrodeposition by electrorefining process in acidic sulfate media contains 40 g/l of cupric ions and 160 g/l of sulfuric acid was achieved to study the influence of the operating parameters on cathode purity, surface morphology, deposition rate, current efficiency and power consumption. These operating parameters and there ranges are: current density 200, 300 and 400 A/m2, electrolyte temperature 35, 50 and 65 oC, electrodes spacing 15, 30 and 45 mm and electrolyte residence time 6, 4 and 2 h were utilized. XRF, SEM and EDX analyses were attained to clarify the properties of the produced cathode.
Commercial fish catch in the Iraqi marine waters from December 2018 to December 2019 was investigated. The study is based on three stations: the first station is located at the Shatt Al-Arab estuary, the second represents the area between the Shatt Al-Arab Estuary and open marine waters, and the third is associated with the Iraqi territorial marine waters. The total weight of the catch was 1881 kg, represented by 500, 654, and 727 kg in the first, second and third stations respectively. The third station was the highest with a majority of the family Sciaenidae by 464 kg, while the lowest was the family Scombridae by 0.5 kg. The total number of species included 37 species, belonging to 27 genera, 19 families, and 6 orders, the largest ord
... Show MoreLymphoma is a cancer arising from B or T lymphocytes that are central immune system components. It is one of the three most common cancers encountered in the canine; lymphoma affects middle-aged to older dogs and usually stems from lymphatic tissues, such as lymph nodes, lymphoid tissue, or spleen. Despite the advance in the management of canine lymphoma, a better understanding of the subtype and tumor aggressiveness is still crucial for improved clinical diagnosis to differentiate malignancy from hyperplastic conditions and to improve decision-making around treating and what treatment type to use. This study aimed to evaluate a potential novel biomarker related to iron metabolism,
... Show MoreThis study investigates the influence of Strategic Consensus (SC) on Organizational Performance (OP), with Strategic Alignment (SA) serving as a mediating variable, within private academic institutions in Iraq. The research utilized scales developed to measure each variable: SC, OP, and SA, all of which are unidimensional. The sample comprised 131 senior participants, including deans and faculty council members, with questionnaires distributed across three institutions: Dijla University College (35 respondents), Baghdad College of Economic Sciences (31 respondents), and the University of Uruk (65 respondents). Data analysis employed various statistical techniques, including normality testing, confirmatory factor analysis, descriptive statis
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More