Preferred Language
Articles
/
ijp-169
Shell model and Hartree-Fock calculations of electron scattering form factors for 25Mg nucleus
...Show More Authors

Shell model and Hartree-Fock calculations have been adopted to study the elastic and inelastic electron scattering form factors for 25Mg nucleus. The wave functions for this nucleus have been utilized from the shell model using USDA two-body effective interaction for this nucleus with the sd shell model space. On the other hand, the SkXcsb Skyrme parameterization has been used within the Hartree-Fock method to get the single-particle potential which is used to calculate the single-particle matrix elements. The calculated form factors have been compared with available experimental data.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Al–bahith Al–a'alami
Electronic media and social issues in Algeria The podcast technique is a model
...Show More Authors

This study we have made a subject of fanny podcast in electronic media, as a new way to express different issues by the public, This study focuses started on how to address social issues in Alegria by ANAS TINA vidéo on the youtube network , you are to know the trends of young amateur about the various issues dealt with as well as the most important methods used to convince browsers.
The researcher used the survey method based on studying 10 episodes videos of blogger ANAS TINA.
The result of the study found that the most important issues are the abduction of children, teaching in Algeria; women in Algeria, The negative aspects of the issues addressed have been established in order to direct public opinion and awareness of ph

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Feb 10 2016
Journal Name
ألمؤتمر الدولي العلمي الخامس للاحصائيين العرب/ القاهرة
Proposition of Modified Genetic Algorithm to Estimate Additive Model by using Simulation
...Show More Authors

Often phenomena suffer from disturbances in their data as well as the difficulty of formulation, especially with a lack of clarity in the response, or the large number of essential differences plaguing the experimental units that have been taking this data from them. Thus emerged the need to include an estimation method implicit rating of these experimental units using the method of discrimination or create blocks for each item of these experimental units in the hope of controlling their responses and make it more homogeneous. Because of the development in the field of computers and taking the principle of the integration of sciences it has been found that modern algorithms used in the field of Computer Science genetic algorithm or ant colo

... Show More
Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Semi-parametric Methods in Partial Linear Single-Index Model
...Show More Authors

The research dealt with a comparative study between some semi-parametric estimation methods to the Partial linear Single Index Model using simulation. There are two approaches to model estimation two-stage procedure and MADE to estimate this model. Simulations were used to study the finite sample performance of estimating methods based on different Single Index models, error variances, and different sample sizes , and the mean average squared errors were used as a comparison criterion between the methods were used. The results showed a preference for the two-stage procedure depending on all the cases that were used

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
The Prediction of the Electromagnetic Properties and the ?(E2/M1) of 110-116Cd-Isotopes in IBM Model
...Show More Authors

The Nuclear structure of 110-116Cd isotopes was studied theoretically in the framework of the interacting boson model of IBM-l and IBM-2. The properties of the lowest mixed symmetry states such as the 1+, 2+ and 3+ levels produced by the IBM-2 model in the vibrational-limit U(5) of Cd - isotopes are studied in details. This analysis shows that the character of mixed symmetry of 2+ is shared between and states in 110-114Cd – isotopes, the large shar goes to s, while in isotope, the state is declared as a mixed symmetry state without sharing. This identification is confirmed by the percentage of F-spin contribution. The electromagnetic properties of E2 and Ml operators were investigated and the results were analyzed. Various

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Study of the matter density distributions of halo nuclei 6He and 16C using the binary cluster model
...Show More Authors

The harmonic oscillator (HO) and Gaussian (GS) wave functions within the binary cluster model (BCM) have been employ to investigate the ground state neutron, proton and matter densities as well as the elastic form factors of two- neutron 6He and 16C halo nuclei. The long tail is a property that is clearly revealed in the density of the neutrons since it is found in halo orbits. The existence of a long tail in the neutron density distributions of 6He and 16C indicating that these nuclei have a neutron halo structure. Moreover, the matter rms radii and the reaction cross section (𝜎𝑅 ) of these nuclei have been calculated using the Glauber model.

View Publication
Publication Date
Fri Nov 01 2019
Journal Name
Journal Of Physics: Conference Series
The Bifurcation analysis of Prey-Predator Model in The Presence of Stage Structured with Harvesting and Toxicity
...Show More Authors
Abstract<p>For a mathematical model the local bifurcation like pitchfork, transcritical and saddle node occurrence condition is defined in this paper. With the existing of toxicity and harvesting in predator and prey it consist of stage-structured. Near the positive equilibrium point of mathematical model on the Hopf bifurcation with particular emphasis it established. Near the equilibrium point E<sub>0</sub> the transcritical bifurcation occurs it is described with analysis. And it shown that at equilibrium points E<sub>1</sub> and E<sub>2</sub> happened the occurrence of saddle-node bifurcation. At each point the pitch fork bifurcation occurrence is not happened. </p> ... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Geological Journal
Development of 3D Geological Model and Analysis of the Uncertainty in a Tight Oil Reservoir in the Halfaya Oil Field
...Show More Authors

A geological model was built for the Sadi reservoir, located at the Halfaya oil field. It is regarded as one of the most significant oilfields in Iraq. The study includes several steps, the most essential of which was importing well logs from six oil wells to the Interactive Petrophysics software for conducting interpretation and analysis to calculate the petrophysical properties such as permeability, porosity, shale volume, water saturation, and NTG and then importing maps and the well tops to the Petrel software to build the 3D-Geological model and to calculate the value of the original oil in place. Three geological surfaces were produced for all Sadi units based on well-top data and the top Sadi structural map. The reservoir has

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Linguistic Fuzzy Trust Model over Oscillating Wireless Sensor Networks
...Show More Authors

Simulation  of  the  Linguistic  Fuzzy Trust  Model  (LFTM)  over  oscillating  Wireless  Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network

... Show More
View Publication Preview PDF
Crossref