The nonlinear refractive (NLR) index and third order susceptibility (X3) of carbon quantum dots (CQDs) have been studied using two laser wavelengths (473 and 532 nm). The z-scan technique was used to examine the nonlinearity. Results showed that all concentrations have negative NLR indices in the order of 10−10 cm2/W at two laser wavelengths. Moreover, the nonlinearity of CQDs was improved by increasing the concentration of CQDs. The highest value of third order susceptibility was found to be 3.32*10−8 (esu) for CQDs with a concentration of 70 mA at 473 nm wavelength.
Reservoir characterization is an important component of hydrocarbon exploration and production, which requires the integration of different disciplines for accurate subsurface modeling. This comprehensive research paper delves into the complex interplay of rock materials, rock formation techniques, and geological modeling techniques for improving reservoir quality. The research plays an important role dominated by petrophysical factors such as porosity, shale volume, water content, and permeability—as important indicators of reservoir properties, fluid behavior, and hydrocarbon potential. It examines various rock cataloging techniques, focusing on rock aggregation techniques and self-organizing maps (SOMs) to identify specific and
... Show MoreObjectives: To study the effect of providing tertiary (specialized) health care for type 2 diabetic patients to meet the WHO and ADA standards and glycemic targets.
Method: Six months, Jan. – Jun. 2010, cohort study was conducted on 600 adult diabetics who registered in the National Diabetes Center (NDC) / Al-Mustansiriya University, Baghdad – Iraq. They were followed for 3- 6 months; each time patients were examined physically and their blood pressure, height, weight and BMI were measured. Fasting blood samples were taken from all patients to test the FPG, HbA1c, T.Chol, TG, HDL and LDL.
Results: Patients’ age was 52.85±15.56 year and the male/female ratio was 1.01, the median duration of disease was 7 years and their BMI w
Non-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenarios of NOMA are analyzed and simulated, involving two users and multiple users (four users) to evaluate NOMA's performance. The simulated results indicate that the achievable sum rate for the two users’ scenarios is 16.7 (bps/Hz), while for the multi-users scenario is 20.69 (bps/Hz) at transmitted power of 25 dBm. The BER for two users’ scenarios is 0.004202 and 0.001564 for
... Show MoreProviding stress of poetry on the syllable-, the foot-, and the phonological word- levels is one of the essential objectives of Metrical Phonology Theory. The subsumed number and types of syllables, feet, and meters are steady in poetry compared to other literary texts that is why its analysis demonstrates one of the most outstanding and debatable metrical issues. The roots of Metrical Phonology Theory are derived from prosody which studies poetic meters and versification. In Arabic, the starting point of metrical analysis is prosodic analysis which can be attributed to يديهارفلا in the second half of the eighth century (A.D.). This study aims at pinpointing the values of two metrical parameters in modern Arabic poetry. To
... Show MoreTechnological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,
... Show MoreBackground: There is plenty of evidence
suggesting that involvement of several groups of
viruses in the development and / or acceleration of
Type 1 Diabetes Mellitus (T1DM).
Objective: To analyze the T- cell proliferation in
the presence of Coxsackie virus B5 (CVB5), Polio
and Adenovirus antigens in addition to assessment
of Interferon- gamma (IFN-γ), Interleukins (IL-10
and IL-6).
Methods: In 60 Iraqi T1DM children with recent
onset of T1DM, Lymphocyte proliferation was
analyzed using Methylthiazol tetrazolium (MTT)
assay by culturing Peripheral Blood Lymphocytes
(PBLs) with Coxsackie Virus B5 (CVB5),
Adenovirus, and Polio vaccine. Serum Interferon-γ,
IL-10 and IL-6 were quantified by sandw
An experimental and numerical study was carried out to investigate the heat transfer by natural convection in a three dimensional annulus enclosure filled with porous media (silica sand) between two inclined concentric cylinders with (and without) annular fins attached to the inner cylinder under steady state condition. The experiments were carried out for a range of modified Rayleigh number (0.2 ≤Ra*≤ 11) and extended to Ra*=500 for numerical study and for annulus inclination angle of (δ = 0˚, 30˚, 60˚ and 90˚). The numerical study was to give the governing equation under assumptions that used Darcy law and Boussinesq’s approximation and then it was solved numerically using finite difference approximation. It was found that t
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreGhrelin and leptin are hunger hormones related to type 2 diabetes mellitus (T2DM), and the pathogenesis of T2DM is the abnormality in insulin secretion and insulin resistance (IR). The aim of this study is to evaluate ghrelin and leptin concentrations in blood and to specify the relationship of these hormones as dependent variables with some biochemical and clinical measurements in T2DM patients. In this study, forty one T2DM and forty three non-diabetes mellitus (non-DM) subjects, aged between 40-60 years and with normal weight, were enrolled. Fasting serum ghrelin and leptin were estimated by enzyme-linked immunosorbent assay (ELISA). In our results ghrelin was significantly increased, and leptin was significantly decreased, in T2DM pa
... Show More