The experimental proton resonance data for the reaction P+48Ti have been used to calculate and evaluate the level density by employed the Gaussian Orthogonal Ensemble, GOE version of RMT, Constant Temperature, CT and Back Shifted Fermi Gas, BSFG models at certain spin-parity and at different proton energies. The results of GOE model are found in agreement with other, while the level density calculated using the BSFG Model showed less values with spin dependence more than parity, due the limitation in the parameters (level density parameter, a, Energy shift parameter, E1and spin cut off parameter, σc). Also, in the CT Model the level density results depend mainly on two parameters (T and ground state back shift energy, E0), which are approximately constant in their behavior with the proton energy compared with GOE model. The RMT estimation used to calculate the corrections of the incompleteness proton resonance measurement data by using two methods; the conventional analysis method, which depends on the resonance widths and the updated, developed, tested and applied a new analysis method, which depends mainly on the resonance spacings. The spacing analysis method is found much less sensitive to non-statistical phenomena than is the width analysis method. Where the analysis of a given data set via these two independent analysis methods indicated the increasing in the reliability of the determination of the missing fraction of levels, the observed fraction f between 0.87+0.13−0.11 – 0.68+0.12−0.12 for different spin-parity of this reaction and then the distinguishability in the level density calculations can be achieved. The modified Porter Thomas distribution along with the maximum likelihood function have been used to get the missing levels corrections for 5 proton resonance sequences in the present reaction. To estimate the present long-range correlations for pure sequence of levels the mean square of the deviation of the cumulative number of levels from a fitted straight line represented by the Dyson and Mehta Δ3 statistic has been employed for spin parity 12+, and calculated the <Δ3> against the cumulative number of proton levels.
The research aimed to use HIIT exercises, and to know the effect of HIIT exercises on some physiological and physical indicators of the young badminton players, and to identify the degree of competition anxiety and the performance of some offense skills among the young badminton players. The research community (the young badminton players), the research sample and its selection method (the research sample was chosen by the intentional method (8) badminton player from the Athwari Club), the scientific method (the experimental method with pre and post tests), measurement tools: physiological tests (high and low blood pressure) , pulse, and physical exams (explosive force of arms and legs) and the offense skills and the scale of competit
... Show MoreHuman beings have an innate and natural aim to achieve their self-interests and to show their ability to overcome challenges in a better way, therefore the move towards self determination is expressed by intrinsic motivation. The desire of absorbing in this task is to enjoy the task in it self and benefitting from it such a motivation is the desire rooted in human nature to judge and choose in which individual is conscious in his self, abilities and adequacy that help him in control the different situations of life passed by him. His choices and actions are voluntary and non-restricted to intervention or external control because control is inner and subjective, while his behavior is self-regulated with the feeling of
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type: , and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.