The study of Mars's ionosphere was made by investigating the measurements of the electron density (Ne) depending of the variation of the solar activities through different local time, different seasons, and different altitudes. The datasets has been taken from MARSIS on board the Mars Express spacecraft, the investigation for the solar indices and the electron density (Ne) have been made for two period of time depending on the strength of the geomagnetic storms, the first one was taken when the geomagnetic storms was low as in years (1998 & 2005), the data was chosen for three seasons of these years, Winter (December), Summer (June) and Spring (April). The second period was taken for the years (2001 & 2002) when the geomagnetic s
... Show MoreThe ground state densities of unstable neutron-rich 11Li and 12Be exotic nuclei are studied in the framework of the binary cluster model (BCM). The internal densities of the clusters are described by the single particle harmonic oscillator wave functions. The long tail performance is clearly noticed in the calculated neutron and matter density distributions of these nuclei. The structures of the two valence neutrons in 11Li and 12Be are found to be mixed configurations with dominant (1p1/2)2. Elastic electron scattering proton form factors for 11Li and 12Be are studied using the plane wave Born approximation (PWBA). It is found that the major difference between the calculated form factors of unstable nuclei [11Li, 12Be] and those of stab
... Show MoreA spherical-statistical optical model (SOM) has been used to calculate and evaluate the neutron interaction with medium nuclei (40 ). Empirical formulae of the optical potentials parameters are predicted with minimize accuracy compared with experimental bench work data. With these optical formulae an evaluation of the shape and compound elastic scattering cross-section of interaction neutrons with 56Fe nuclei at different energy range (1-20) MeV has been calculated and compared with experimental results. Also, volume integrals for real and imaginary potential energies have been evaluated and matched with the standard ABAREX code. Good agreements with have been achieved with the available experimental data.
The past years have seen a rapid development in the area of image compression techniques, mainly due to the need of fast and efficient techniques for storage and transmission of data among individuals. Compression is the process of representing the data in a compact form rather than in its original or incompact form. In this paper, integer implementation of Arithmetic Coding (AC) and Discreet Cosine Transform (DCT) were applied to colored images. The DCT was applied using the YCbCr color model. The transformed image was then quantized with the standard quantization tables for luminance and chrominance. The quantized coefficients were scanned by zigzag scan and the output was encoded using AC. The results showed a decent compression ratio
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show More