The Neutron Fermi Age, t, and the neutron slowing down density, q (r, t) , have been measured for some materials such as Graphite and Iron by using gamma spectrometry system UCS-30 with NaI (Tl) detector. This technique was applied for Graphite and Iron materials by using Indium foils covered by Cadmium and the measurements done at the Indium resonance of 1.46 eV. These materials are exposed to a plane 241Am/Be neutron source with recent activity 38 mCi. The measurements of the Fermi Age were found to be t = 297 ± 21 cm2 for Graphite, t = 400 ± 28 cm2 for Iron. Neutron slowing down density was also calculated depending on the recent experimental t value and distance.
In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show More<span>Digital audio is required to transmit large sizes of audio information through the most common communication systems; in turn this leads to more challenges in both storage and archieving. In this paper, an efficient audio compressive scheme is proposed, it depends on combined transform coding scheme; it is consist of i) bi-orthogonal (tab 9/7) wavelet transform to decompose the audio signal into low & multi high sub-bands, ii) then the produced sub-bands passed through DCT to de-correlate the signal, iii) the product of the combined transform stage is passed through progressive hierarchical quantization, then traditional run-length encoding (RLE), iv) and finally LZW coding to generate the output mate bitstream.
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreThis study was aimed to measure marketing efficiency and study important factors affecting , using TOBIT qualitative response model for wheat crop in Salahalddin province. Results revealed that independent factors such as (marketing type, crops duration in the field, average marketing cost, distance between farm and marketing center, and average productivity) had an impact on wheat marketing efficiency. This impact varied in size and direction due to value of parameters. Values of marketing efficiency fluctuated within cities and towns in the province. The average value on the province level was 76.75%. This study was recommended developing marketing infrastructures which is essential to efficiency increases. In addition, it is impo
... Show MoreAccurate emotion categorization is an important and challenging task in computer vision and image processing fields. Facial emotion recognition system implies three important stages: Prep-processing and face area allocation, feature extraction and classification. In this study a new system based on geometric features (distances and angles) set derived from the basic facial components such as eyes, eyebrows and mouth using analytical geometry calculations. For classification stage feed forward neural network classifier is used. For evaluation purpose the Standard database "JAFFE" have been used as test material; it holds face samples for seven basic emotions. The results of conducted tests indicate that the use of suggested distances, angles
... Show MoreThe current standard for treating pilonidal sinus (PNS) is surgical intervention with excision of the sinus. Recurrence of PNS can be controlled with good hygiene and regular shaving of the natal cleft, laser treatment is a useful adjunct to prevent recurrence. Carbon dioxide (CO2) laser is a gold standard of soft tissue surgical laser due to its wavelength (10600 nm) thin depth (0.03mm) and collateral thermal zone (150mic).It effectively seals blood vessels, lymphatic, and nerve endings, Moreover wound is rendered sterile by effect of laser. Aim of this study was to apply and assess the clinical usefulness of CO2 10600nm laser in pilonidal sinus excision and decrease chance of recurrence. Design: For 10 patients, between 18 and 39 year
... Show MoreA new algorithm is proposed to compress speech signals using wavelet transform and linear predictive coding. Signal compression based on the concept of selecting a small number of approximation coefficients after they are compressed by the wavelet decomposition (Haar and db4) at a suitable chosen level and ignored details coefficients, and then approximation coefficients are windowed by a rectangular window and fed to the linear predictor. Levinson Durbin algorithm is used to compute LP coefficients, reflection coefficients and predictor error. The compress files contain LP coefficients and previous sample. These files are very small in size compared to the size of the original signals. Compression ratio is calculated from the size of th
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreThe removal of Ibuprofen antibiotics (IBU) by photo-degradation UV/H2O2/Fe+2 system was investigated in a batch reactor under different initial concentrations of H2O2 (100-500) mg/L, Fe+2 (10-40) mg/L, pH (3-9) and initial concentrations of IBU (10-80) mg/L, and their relationship with the degradation efficiency were studied. The result demonstrated that the maximum elimination of IBU was 85.54% achieved at 300 mg/L of H2O2, 30 mg/L of Fe+2, pH=3, and irradiation time of 150 min, for 10 mg/L of IBU. The results have shown that the oxidation reagent H2O2 plays a very important role in IBU degradation.