The cross section evaluation for (α,n) reaction was calculated according to the available International Atomic Energy Agency (IAEA) and other experimental published data . These cross section are the most recent data , while the well known international libraries like ENDF , JENDL , JEFF , etc. We considered an energy range from threshold to 25 M eV in interval (1 MeV). The average weighted cross sections for all available experimental and theoretical(JENDL) data and for all the considered isotopes was calculated . The cross section of the element is then calculated according to the cross sections of the isotopes of that element taking into account their abundance . A mathematical representative equation for each of the element and their isotopes are "formulated" they represent the variation of the cross section with energy . The evaluated (α,n) cross sections which was used to calculate the neutron yield for (Mo) for the first time ,which are very important in nuclear technology .
Objective: This study aims to evaluate nurses' practices regarding electronic nursing documentation
Methodology: 40 nurses have been chosen for a pre experimental sample using a non-probability (purposive) method between November 20, 2021, and March 1, 2023. The pretest and posttest comparisons included the same group that had been exposed to the software.
Results : table the nurses' practices toward electronic nursing documentation was described as poor and fair it means that nurses practices need to be improved and developed by an interventional program. there is no significant differences between age, gender and years of employment variables and nurses practices.
... Show MoreThe aim of the research is to determine the impact of evaluating the investment projects in the development and preparation of investment budgets prepared by the economic units, since the investment projects are of an important and vital nature of the economic units, because these projects include the length of time for preparation and implementation and the accompanying period of this risk and uncertainties as well as need To the many funds to complete the project , The process of evaluating the implemented projects, which have been prepared an investment budget previously will contribute to the extent of matching the estimated data with the actual results or deviations, which is a step to avoid these errors in future p
... Show MoreThe useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
This paper deals to how to estimate points non measured spatial data when the number of its terms (sample spatial) a few, that are not preferred for the estimation process, because we also know that whenever if the data is large, the estimation results of the points non measured to be better and thus the variance estimate less, so the idea of this paper is how to take advantage of the data other secondary (auxiliary), which have a strong correlation with the primary data (basic) to be estimated single points of non-measured, as well as measuring the variance estimate, has been the use of technique Co-kriging in this field to build predictions spatial estimation process, and then we applied this idea to real data in th
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThis study identified the genus Coelastrella Chodat, 1922 which was isolated from a sediment sample taken from the Tigris river in Baghdad Governorate, Iraq. The alga was isolated and cultured in modified Chu 10 media and the morphological features of the isolated algae were observed in light microscopy (LM); it showed some characteristic features of this genus, such as its ellipsoidal or lemon- shaped cells, a visible pyrenoid and the chloroplast parietal. To ensure correct identification of the isolated alga, a molecular analysis using 18S rRNA gene and DNA sequencing revealed a match with C. terrestris (Reisigl) Hedewald & N. Hanagata 2002. This species is a new record in Iraq
... Show MoreEighteen new cyclic imides (maleimides) conncted to benzothiazole moiety through sulfonamide group were synthesized via multistep synthesis.The first step involved preparation of two maleamic acids N-phenylmaleamic acid and N-benzylmaleamic acid via reaction of maleic anhydride with aniline or benzyl amine.Dehydration of the prepared amic acids by treatment with acetic anhydride and anhydrous sodium acetate in the second step afforded N-phenylmaleimide and N- benzyl maleimide which in turn were treated with chlorosulfonic acid in the third step to afford 4-(N-maleimidyl) phenyl sulfonyl chloride and 4-(N-maleimidyl) benzyl sulfonyl chloride respectively.In the Fourth step of this work each one of the two prepared maleimidyl sulfonyl chlorid
... Show MoreIn this work, novel copolymers of poly(adipic anhydride-co-mannitol) were synthesized by melting condensation polymerization of poly(adipic anhydride) with five percentages of mannitol sugar, 1 to 5 Wt.%. These copolymers were purified and then, characterized by FT-IR, which was proved that the cross-linking reaction was caused by nucleophilic attack of mannitol hydroxyl group to acidic anhydride groups of poly(adipic anhydride) backbone and new ester groups were formed and appeared. Also, modified organic-soluble chitosan, N-maleoyl-chitosan, were synthesized by grafting reaction of chitosan with maleic anhydride in DMF as solvent, and it was also purified and characterized by FT-IR. Biodegradation in vitro of the IPNs of poly(adipic anhyd
... Show More