The challenge in studying fusion reaction when the projectile is neutron or proton rich halo nuclei is the coupling mechanism between the elastic and the breakup channel, therefore the motivation from the present calculations is to estimate the best coupling parameter to introduce the effect of coupled-channels for the calculations of the total cross section of the fusion , the barrier distribution of the fusion and the average angular momentum 〈L〉 for the systems 6He+206Pb, 8B+28Si, 11Be+209Bi, 17F+208Pb, 6He+238U, 8He+197Au and 15C+232Th using quantum mechanical approach. A quantum Coupled-Channel Calculations are performed using CC code. The predictions of quantum mechanical approach are comparable with the measured data that is available. Above and below the Coulomb barrier, comparison of theoretical calculations of quantum mechanical with the relevant measured data demonstrates good agreement
Phenol condensed with β-keto esters via Pechmann condensation to form derivatives of Coumarin in various reaction conditions by two ways. Present paper is comparative study of synthesis Coumarin with the yield of product , reaction time and reaction conditions.
DBNRSK Sayed, Journal of Strategic Research in Social Science (JoSReSS), 2020
The two body model of (Core+n) within the radial wave functions of the cosh potential has been used to investigate the ground state features such as the proton, neutron and matter densities, the root mean square (RMS) nuclear proton, neutron, charge and mass radii of unstable neutron-rich 14B, 15C, 19C and 22N nuclei. The calculated results show that the two body model with the radial wave functions of the cosh potential succeeds in reproducing neutron halo in these nuclei.
Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreAbstract
The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test images, and compared with some present methods.
... Show MoreA field experiment was conducted at Abu-Ghrib during 2013- 2014 season to study the effect of harrowing systems on the decomposition and fermentation on organic matter(OM) when added and mixed with the soil under special technology, as well as its effect on the growth parameters and productivity of (Zea mays L. 5018). The experiment was laid out using factorial randomized complete block design (RCBD) in split-split design with three replications in SCL bare soil with a percent of moisture ranged from 16 – 18 %. The main plots were designated to the two systems of harrowing (Rotary Harrowand Disc Harrow ). The sub main plots were specified for two organic matters ( Sheep manure ,cow manure ) . Data were statistically analyzed, and
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThe new, standard molecular biologic system for duplicating DNA enzymatically devoid of employing a living organism, like E. coli or yeast, represents polymerases chain reaction (PCR). This technology allows an exponential intensification of a minor quantity of DNA molecule several times. Analysis can be straightforward with more DNA available. A thermal heat cycler performs a polymerization chain reaction that involves repeated cycles of heating and cooling the reactant tubes at the desired temperature for each reaction step. A heated deck is positioned on the upper reaction tube to avoid evaporating the reaction mixture (normally volumes range from 15 to 100 l per tube), or an oil layer can be placed on a reaction mixture su
... Show More
