In the current research, multiple mixing ratios of gamma -transitions of the energy levels 60𝑁𝑑 142−150 isotopes populated in 𝑁𝑑(𝑛, 𝑛 ˊ 60 142−150 ) 60𝑁𝑑 142−150 interaction are calculated using the constant statistical tensor (CST) method. The results obtained are, in general, in good agreement or consistent, within the experimental error, with the results published in the previously researches. Existing discrepancies result from inaccuracies in the experimental results of previous works. The current results confirm the validity of the constant statistical tenser method of calculating the values of mixing ratios and its predictability of errors in experimental results
In present work examined the oxidation desulfurization in batch system for model fuels with 2250 ppm sulfur content using air as the oxidant and ZnO/AC composite prepared by thermal co-precipitation method. Different factors were studied such as composite loading 1, 1.5 and 2.5 g, temperature 25 oC, 30 oC and 40 oC and reaction time 30, 45 and 60 minutes. The optimum condition is obtained by using Tauguchi experiential design for oxidation desulfurization of model fuel. the highest percent sulfur removal is about 33 at optimum conditions. The kinetic and effect of internal mass transfer were studied for oxidation desulfurization of model fuel, also an empirical kinetic model was calculated for model fuels
... Show More In this research, an adaptive Canny algorithm using fast Otsu multithresholding method is presented, in which fast Otsu multithresholding method is used to calculate the optimum maximum and minimum hysteresis values and used as automatic thresholding for the fourth stage of the Canny algorithm. The new adaptive Canny algorithm and the standard Canny algorithm (manual hysteresis value) was tested on standard image (Lena) and satellite image. The results approved the validity and accuracy of the new algorithm to find the images edges for personal and satellite images as pre-step for image segmentation.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
A new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte
... Show MoreThe techniques of fractional calculus are applied successfully in many branches of science and engineering, one of the techniques is the Elzaki Adomian decomposition method (EADM), which researchers did not study with the fractional derivative of Caputo Fabrizio. This work aims to study the Elzaki Adomian decomposition method (EADM) to solve fractional differential equations with the Caputo-Fabrizio derivative. We presented the algorithm of this method with the CF operator and discussed its convergence by using the method of the Cauchy series then, the method has applied to solve Burger, heat-like, and, couped Burger equations with the Caputo -Fabrizio operator. To conclude the method was convergent and effective for solving this type of
... Show MoreAbstract The purpose of the study is to develop self-attendance fear measures for table tennis players and tennis players with disabilities, as well as to gauge how severe these fears are in both groups. The authors propose that there are no statistically significant differences in the level of fear of self-attendance for players of ground tennis and table tennis for the disabled between the arithmetic mean and the hypothetical mean. In keeping with the nature of the current study, we adopted a descriptive methodology, and the sample comprised 62 players of table tennis and tennis for the disabled. The authors make use of the Al-Taei prepared scale (fears of selfattendance). The statistical package for educational sciences (spss v 26)
... Show MoreAdyertising sponsorship is one of the most prominent public activities, hich drives many public relations relations practitioners in companies to rely heavily on it in order to achieve positive results that contribute to the marketing of the brands of these sponsoring companies. The problem of Our research can be identified by the main question: What is the role of advertising sponsorship in brand marketing "The research aims to identify the role of sponsorship in brand marketing, and its role in attracting the public's attention to the products of the sponsors. As well as clarifying the role of the care method in the popularity of the products of the Sponsorship companies.
This research highlights one of the most important issues that have been controversial between Islamic schools, which is the duality of Intellect and Revelation and the nature of their relationship, in two core points:
The first point: Could there be a real conflict between Intellect and revelation? While the school of hadith view that this assumption is a rational assumption that does not real as long as the revelation is correct and the Intellect is clear, and that what is claimed are due to other Intellect s, we find that the Ash’ari school adopts the saying that the real conflict may occur, but rather confirms its occurrence.
The second point: For whom is the priority, for the Intellect or th
... Show MoreKurdish language multifunctional morphemes indicate the different functional morphological, syntactical, and semantic tasks of the morphemes. The present study discusses the multifunctional task of the Morpheme Le in Kurdish Language. The Morpheme Le has marginally been included in other studies, yet up to the present times, there has not been a research inclusively dedicated to thoroughly discuss and clarify its multifunctional aspects. The present study is divided into two chapters: Chapter one discusses the theoretical aspect of chapter two that is entirely concerned with the practical aspect of the morpheme Le. The first part of chapter one sheds light on the morphological aspect of the morpheme while part two discusses
... Show MoreThe problems of urban historic centers are considered some of the subjects which are widely dealt with in urban studies since the middle of the 20th century. literature of urban development have raised it , beside the fact that large number of urban development projects of the historical centers in many cities of the world ,and emerged from the application of these new problems projects added their original urban problems , because these projects have dealt with the physical structures with the neglect of the social and economic sides, which are the base in sustainable development nResearch problem was elaborated as : The unclearly of knowledge of the potentials of the sustainable development in solving the urban problems of historic cen
... Show More