The cross section evaluation for (α,n) reaction was calculated according to the available International Atomic Energy Agency (IAEA) and other experimental published data . These cross section are the most recent data , while the well known international libraries like ENDF , JENDL , JEFF , etc. We considered an energy range from threshold to 25 M eV in interval (1 MeV). The average weighted cross sections for all available experimental and theoretical(JENDL) data and for all the considered isotopes was calculated . The cross section of the element is then calculated according to the cross sections of the isotopes of that element taking into account their abundance . A mathematical representative equation for each of the element and their isotopes are "formulated" they represent the variation of the cross section with energy . The evaluated (α,n) cross sections which was used to calculate the neutron yield for (Mo) for the first time ,which are very important in nuclear technology .
From 1979 to 1999 several theatricl groups had produced (Mackbeth) by shakespear which were directed by different director and the role being played by different actors. So the questions are: How did those a Iraqi actors approach that character by their performance? Did they interpret the character Truelly as the poet wanted to be. The researcher aims to find out the true performance by the actor who impersonate (mackbeth) as a wicked personality, who had un rational ambition. The researcher also aims to expose the style of acting fallowed by the Iraqi actors in that play. In chapter of review of literature, The researcher discusses the weaning and procedure of the actor performance which include characterization and transformation. He a
... Show MoreAbstract
It considers training programs is an important process contributing to provide employees with the skills required to do their jobs efficiently and effectively, so it should be concerned with and the focus of all government our organizations, and perhaps the most important reasons that I was invited to select the subject (evaluation of training programs directed toward the diagnosis of the phenomenon of financial and administrative corruption) It is the importance of those programs working in the regulatory institutions General and the Office of Inspector General of Finance and the Ministry particularly for employees because of their role in the development of their skills and their experience and their beha
... Show MoreBackground: The PMMA polymer denture base materials are low in thermal and strength properties. The aim of the study was to investigate the change in glass transition temperature, E-Moudulus and coefficient of thermal expansion of acrylic denture base material by addition of Al2O3, TiO2 and SiO2nano-fillers in 5% by weight. Materials and methods: The type of polymerization is free radical bulk polymerization. one hundred twenty (120) specimens were prepared , the specimens were divided into four groups according to the material had been added (one control and three for Al2O3, TiO2 and SiO2nanocomposite) each group was subdivided in to three groups according to the test had been done on it, the degree of transition (Tg) was measured by The d
... Show MoreIncremental Sheet Metal Forming (ISMF) is a modern sheet metal forming technology which offers the possibility of manufacturing 3D complex parts of thin sheet metals using the CNC milling machine. The surface quality is a very important aspect in any manufacturing process. Therefore, this study focuses on the resultant residual stresses by forming parameters, namely; (tool shape, step over, feed rate, and slope angle) using Taguchi method for the products formed by single point incremental forming process (SPIF). For evaluating the surface quality, practical experiments to produce pyramid like shape have been implemented on aluminum sheets (AA1050) for thickness (0.9) mm. Three types of tool shape used in this work, the spherical tool ga
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreData centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le
... Show MoreThe seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.