The ground-state properties of exotic 18N and 20F nuclei, including the neutron, proton and matter densities and related radii are investigated using the two-body model of within Gaussian (GS) and Woods Saxon (WS) wave functions. The long tail is evident in the computed neutron and matter densities of these nuclei. The plane wave Born approximation (PWBA) is calculate the elastic form factors of these exotic nuclei. The variation in the proton density distributions due to the presence of the extra neutrons in 18N and 20F leads to a major difference between the elastic form factors of these exotic nuclei and their stable isotopes 14N and 19F. The reaction c
... Show MoreStructure of unstable 21,23,25,26F nuclei have been investigated
using Hartree – Fock (HF) and shell model calculations. The ground
state proton, neutron and matter density distributions, root mean
square (rms) radii and neutron skin thickness of these isotopes are
studied. Shell model calculations are performed using SDBA
interaction. In HF method the selected effective nuclear interactions,
namely the Skyrme parameterizations SLy4, Skeσ, SkBsk9 and
Skxs25 are used. Also, the elastic electron scattering form factors of
these isotopes are studied. The calculated form factors in HF
calculations show many diffraction minima in contrary to shell
model, which predicts less diffraction minima. The long tail
Solar collectors, in general, are utilized to convert the solar energy into heat energy, where it is employed to generate electricity. The non-concentrating solar collector with a circular shape was adopted in the present study. Ambient air is heated under a translucent roof where buoyant air is drawn from outside periphery towards the collector center (tower base). The present study is aimed to predict and visualize the thermal-hydrodynamic behavior for airflow under inclined roof of the solar air collector, SAC. Three-dimensional of the SAC model using the re-normalization group, RNG, k−ε turbulence viscus model is simulated. The simulation was carried out by using ANSYS-FLUENT 14.5. The simulation
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreThe inelastic C2 form factors and the charge density distribution (CDD) for 58,60,62Ni and 64,66,68Zn nuclei has been investigated by employing the Skyrme-Hartree-Fock method with (Sk35-Skzs*) parametrization. The inelastic C2 form factor is calculated by using the shape of Tassie and Bohr-Mottelson models with appropriate proton and neutron effective charges to account for the core-polarization effects contribution. The comparison of the predicted theoretical values was conducted with the available measured data for C2 and CDD form factors and showed very good agreement.
In this paper, a mathematical model for the oxidative desulfurization of kerosene had been developed. The mathematical model and simulation process is a very important process due to it provides a better understanding of a real process. The mathematical model in this study was based on experimental results which were taken from literature to calculate the optimal kinetic parameters where simulation and optimization were conducted using gPROMS software. The optimal kinetic parameters were Activation energy 18.63958 kJ/mol, Pre-exponential factor 2201.34 (wt)-0.76636. min-1 and the reaction order 1.76636. These optimal kinetic parameters were used to find the optimal reaction conditions which
... Show MoreUsing the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through tha
... Show MoreUsing the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result
... Show MoreInformation security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo