In an earlier paper, the basic analytical formula for particle-hole nuclear state densities was derived for non-Equidistant Spacing Model (non-ESM) approach. In this paper, an extension of the former equation was made to include pairing. Also a suggestion was made to derive the exact formula for the particle-hole state densities that depends exactly on Fermi energy and nuclear binding energies. The results indicated that the effects of pairing reduce the state density values, with similar dependence in the ESM system but with less strength. The results of the suggested exact formula indicated some modification from earlier non-ESM approximate treatment, on the cost of more calculation time
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreShadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show MoreResearch Summary:
Seeking happiness and searching for it have been among the priorities of mankind from the beginning of his creation and will remain so until the end of this world, and even in the next life, he seeks happiness, but the difference is that a person can work in this world to obtain it, but in the next life he is expected to get what he done in this world. And among these reasons are practical actions that a person undertakes while he intends to draw close to God Almighty, so they lead him to attain his desired perfection, and to attain his goals and objectives, which is the minimum happiness in this life, and ultimate happiness after the soul separates the body, and on the day of the judgment, Amon
... Show Moreيهدف البحث الى تحليل الخيارات الاستراتيجية للاقتراض الخارجي في العراق لاستشراف افضل الخيارات الاستراتيجية المستقبلية في مجال الاقتراض الخارجي في دائرة الدين العام في وزارة المالية ، وقد استخدم الباحث منهج دراسة الحالة وباستعمال اسلوب تحليل خوارزمية ال K-Means لتشخيص كفاءة الاقتراض الخارجي لعينة البحث البالغة (81) قرضا التي اقترضتها وزارة المالية للفترة 2007-2020 . ولقد كان الغرض الرئيسي للبحث المساهمة في تمكين وزا
... Show MoreThis paper presents an analytical study for the magnetohydrodynamic (MHD) flow of a generalized Burgers’ fluid in an annular pipe. Closed from solutions for velocity is obtained by using finite Hankel transform and discrete Laplace transform of the sequential fractional derivatives. Finally, the figures are plotted to show the effects of different parameters on the velocity profile.
In this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel
... Show MoreSouth Sudan is known by its tribal and racial variation .Tribal Perception represents the
procedure of dealings in Southern society .And that what make Sudan as a stable country that
suffer from divisions . Everybody wants to rule in spite of his inability and un qualification
which enables the establishment of an urbanized country .the frustration of the state in
handling the interior variety on religious, tribal and racial basis and contracting national
ideality in spared by shared ingredients between gathered groups in one state, all these reasons
make it hard to create a united national identity which is able to unite atheist and religious
parties together. Due to this ,the study is established to clarify the nat
Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random
... Show More