Maximum values of one particle radial electronic density distribution has been calculated by using Hartree-Fock (HF)wave function with data published by[A. Sarsa et al. Atomic Data and Nuclear Data Tables 88 (2004) 163–202] for K and L shells for some Be-like ions. The Results confirm that there is a linear behavior restricted the increasing of maximum points of one particle radial electronic density distribution for K and L shells throughout some Be-like ions. This linear behavior can be described by using the nth term formula of arithmetic sequence, that can be used to calculate the maximum radial electronic density distribution for any ion within Be like ions for Z<20.
A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreThis paper uses classical and shrinkage estimators to estimate the system reliability (R) in the stress-strength model when the stress and strength follow the Inverse Chen distribution (ICD). The comparisons of the proposed estimators have been presented using a simulation that depends on the mean squared error (MSE) criteria.
The estimation of the stressÙ€ strength reliability of Invers Kumaraswamy distribution will be introduced in this paper based on the maximum likelihood, moment and shrinkage methods. The mean squared error has been used to compare among proposed estimators. Also a Monte Carlo simulation study is conducted to investigate the performance of the proposed methods in this paper.
In this study, the quality assurance of the linear accelerator available at the Baghdad Center for Radiation Therapy and Nuclear Medicine was verified using Star Track and Perspex. The study was established from August to December 2018. This study showed that there was an acceptable variation in the dose output of the linear accelerator. This variation was ±2% and it was within the permissible range according to the recommendations of the manufacturer of the accelerator (Elkta).
Linear Feedback Shift Register (LFSR) systems are used widely in stream cipher systems field. Any system of LFSR's which wauldn't be attacked must first construct the system of linear equations of the LFSR unit. In this paper methods are developed to construct a system of linear/nonlinear equations of key generator (a LFSR's system) where the effect of combining (Boolean) function of LFSR is obvious. Before solving the system of linear/nonlinear equations by using one of the known classical methods, we have to test the uniqueness of the solution. Finding the solution to these systems mean finding the initial values of the LFSR's of the generator. Two known generators are used to test and apply the ideas of the paper,
... Show MoreThe oscillation property of the second order half linear dynamic equation was studied, some sufficient conditions were obtained to ensure the oscillation of all solutions of the equation. The results are supported by illustrative examples.
In The Name of Allah Most Gracious Most Merciful
The fundamentals of jurisprudence have a great role in facilitating the ways to know the Shari’a rulings for everything that takes place between people in terms of relationships, and the actions that are issued by them, because without it, the sources from which the rulings were taken are not known, and the methods used by the imams of ijtihad in taking these rulings from those sources are not understood. The foundations on which they followed in the interpretation of texts and its rules, and Muslim scholars in different eras celebrated this science and gave it great care: with what they wrote in it from the works of different directions, but of course the complexity printed many
... Show MoreThe experiences in the life are considered important for many fields, such as industry, medical and others. In literature, researchers are focused on flexible lifetime distribution.
In this paper, some Bayesian estimators for the unknown scale parameter of Inverse Rayleigh Distribution have been obtained, of different two loss functions, represented by Suggested and Generalized loss function based on Non-Informative prior using Jeffery's and informative prior represented by Exponential distribution. The performance of estimators is compared empirically with Maximum Likelihood estimator, Using Monte Carlo Simulation depending on the Mean Square Error (MSE). Generally, the preference of Bayesian method of Suggeste
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More