The present study focuses on the deformation of neutron-rich nuclei near the neutron drip line. The nuclei of interest include 28O, 42Si, 58Ca, 80Ni, 100Kr, 122Ru, 152Ba, 166Sm, and 176Er. The relativistic Hartree - Bogoliubov (RHB) approach with effective density-dependent point coupling is utilized to investigate the triaxial deformation, and Skyrme - Hartree - Fock + Bardeen - Cooper - Schrieffer is used to analyze the axial deformation. The study aimed to understand the interplay between nuclear forces, particle interactions, and shell structure to gain insights into the unique behavior of neutron-rich nuclei. Despite these nuclei containing magic numbers, their shapes are still affected by the nucleons' collective behavior and
... Show MoreThis paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThe current research aims to adopt production quality decisions as the most important decisions , because they are accompanied by customer satisfaction through monitoring the quality of drinking water in iraq which reach through the pipeline network associated with water treatment projects of Tigris and Euphrates rivers. One of the indicators of quality control was the drawing of the C-chart by specifying the central line and the upper and lower limit of the control and the diagnosis of whether the production system as a whole within the scope of quality control or not and determine the strength and significance of the correlation between the quantities of water And actual needs for customers , the research has reached a number o
... Show More
Abstract
This research studies Abu Baker Al-Siddiq’s commandments to the leaders of his armies. The research is organized into an Introduction, three sections, and a Conclusion.
The Introduction presents a definition of Style and Commandment terminologies. It also presents a brief biography of Abu Baker Al-Siddiq may Allah be pleased with him.
The first section explains the characteristics of the Composition and its rhetorical significance. In this Section, I study the types of predicate and the methods of construction in Abu Baker’s commandments and the rhetoric in using the connection and disconnection modifiers in his expressions.
The second section e
... Show MoreObjective: To evaluate the functional outcomes after extended curettage and reconstruction using a combination of bone graft and bone cement (sandwich). Methodology: In this prospective case series 16 skeletally mature patients with primary giant cell tumor around the knee were included. Patients with previous surgically treated, malignant transformation, degenerative knee changes and those presenting with pathological fracture were excluded. The tumor was excised with bone graft filling space beneath the articular cartilage and a block of gel foam was placed over the cortical surface of picked bone graft. Remaining cavity was filled with polymethylmethacrylate cement (sandwich) with or without internal fixation. The func tional evaluation
... Show MoreThe influence of an aortic aneurysm on blood flow waveforms is well established, but how to exploit this link for diagnostic purposes still remains challenging. This work uses a combination of experimental and computational modelling to study how aneurysms of various size affect the waveforms. Experimental studies are carried out on fusiform-type aneurysm models, and a comparison of results with those from a one-dimensional fluid–structure interaction model shows close agreement. Further mathematical analysis of these results allows the definition of several indicators that characterize the impact of an aneurysm on waveforms. These indicators are then further studied in a computational model of a systemic blood flow network. This demonstr
... Show More