Preferred Language
Articles
/
ijp-636
Theoretical Calculations of the Cross-sections for (n,α) and (n,xα) reactions on the Structural Material for Fusion Reactor 46-50Ti
...Show More Authors

The biggest problem of structural materials for fusion reactor is the damage caused by the fusion product neutrons to the structural material. If this problem is overcomed, an important milestone will be left behind in fusion energy. One of the important problems of the structural material is that nuclei forming the structural material interacting with fusion neutrons are transmuted to stable or radioactive nuclei via (n, x) (x; alpha, proton, gamma etc.) reactions. In particular, the concentration of helium gas in the structural material increases through deuteron- tritium (D-T) and (n, α) reactions, and this increase significantly changes the microstructure and the properties of the structural materials. Therefore, in this study, the effects of the different nuclear level density models on the excitation functions of the (n, α) reactions on 46-50Ti isotopes, an attractive candidate for the structural material for fusion reactors, have been investigated for the first time. Also, the differential cross-sections with respect to alpha energy for the emission of alpha particles of the 46-50Ti (n, xα) reactions have been investigated at 14.1 MeV incident neutron energy. The calculations are performed using the two-component exciton model in the TALYS 1.9 code, and the results are compared with available experimental data. The results of this study will contribute to nuclear database as required for improving, design and operations of the important facilities as ITER (International Thermonuclear Experimental Reactor), DEMO (The demonstration power plant) and ENS (European Nuclear Society).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Thu Nov 17 2022
Journal Name
Journal Of Interdisciplinary Mathematics
Study on approximate analytical methods for nonlinear differential equations
...Show More Authors

In this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.

Scopus (11)
Scopus
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Nov 03 2025
Journal Name
Nursing Science Quarterly
Improving Sleep Quality for Persons on Hemodialysis in Iraq
...Show More Authors

Insufficient and poor sleep quality significantly impacts the health and quality of life of persons with end-stage renal failure (ESRF) on hemodialysis. This study explored the effectiveness of teaching patients on hemodialysis, Benson’s relaxation technique. Seventy-one persons on hemodialysis in Iraq were randomly assigned to either the experimental or the control group. The experimental group received training and encouragement to use the Benson relaxation technique. The Pittsburgh Sleep Quality Index (PSQI) score was collected for all the patients before and after the intervention. After 8 weeks a repeated measurement of the post-test on sleep quality was done for both groups. The experimental group showed a statistically sign

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
REVIEWING THE IMPLICATIONS OF TRAINING FOR ACADEMIC ADMINISTRATION STAFF AT CENTRAL MICHIGAN UNIVERSITY
...Show More Authors

Training has an effect on employees’ performances. Accordingly, the person who is responsible for employees’ development must figure out the most effective way to train and develop employees. Central Michigan University (CMU) has recognized the importance of providing appropriate training for employees who have a duty in advising students. The reason is that these employees have a significant impact on students’ educational performances. Thus, special attention to this category of employees is needed to improve advising quality. This research attempted to explore the impact of training on academic advising at CMU. Face-to-face interviews and online surveys were used as data collection tools for this study. The study scope c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Heliyon
A comprehensive review on modelling the adsorption process for heavy metal removal from waste water using artificial neural network technique
...Show More Authors

View Publication Preview PDF
Scopus (63)
Crossref (51)
Scopus Clarivate Crossref
Publication Date
Sat Feb 28 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of shear bond strength between thermosens as relining material and different denture base materials
...Show More Authors

Background: Denture relining is the process of resurfacing of the tissue side of the ill fitting denture, the bond strength at the relining-denture base interface is most important for denture durability.The aim of present study was to evaluate the shear bond strength between the thermosens as relining material and different denture base materials that bonded by thermo fusing liquid. As this corrective procedureis the common chair side procedure in the dental clinic. Material and method: Sixty samples were prepared and divided into three main groups according to the type of denture base materials.Group (A) referred to the heat cure acrylic samples which consisted of 20 samples. Group (B) referred to the high impact acrylic samples which con

... Show More
View Publication Preview PDF