The neutron, proton, and matter densities of the ground state of the proton-rich 23Al and 27P exotic nuclei were analyzed using the binary cluster model (BCM). Two density parameterizations were used in BCM calculations namely; Gaussian (GS) and harmonic oscillator (HO) parameterizations. According to the calculated results, it found that the BCM gives a good description of the nuclear structure for above proton-rich exotic nuclei. The elastic form factors of the unstable 23Al and 27P exotic nuclei and those of their stable isotopes 27Al and 31P are studied by the plane-wave Born approximation. The main difference between the elastic form factors of unstable nuclei and their stable isotopes is caused by the variation in the proton density distributions, especially the details of the outer part. Moreover, the Glauber model is used to calculate the matter rms radii and reaction cross-section of these exotic nuclei. The calculated results of the mentioned nuclei give a good accordance with the experimental data.
The effect of heat treatment on the optical properties of the bulk heterojunction blend nickel (II) phthalocyanine tetrasulfonic acid tetrasodium salt and Tris (8-hydroxyquinolinato) Aluminum (NiPcTs/Alq3) thin films which prepared by spin coating was described in this study. The films coated on a glass substrate with speed of 1500 rpm for 1.5 min and treated with different annealing temperature (373, 423 and 473) K. The samples characterized using UV-Vis, X ray diffraction and Fourier transform Infrared (FTIR) spectra, XRD patterns indicated the presence of amorphous and polycrystalline blend (NiPcTs/Alq3). The results of UV visible shows that the band gap increase with increasing the annealing temperature up to 373 K and decreases with
... Show MoreThe present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil
... Show MoreIn this paper, The transfer function model in the time series was estimated using different methods, including parametric Represented by the method of the Conditional Likelihood Function, as well as the use of abilities nonparametric are in two methods local linear regression and cubic smoothing spline method, This research aims to compare those capabilities with the nonlinear transfer function model by using the style of simulation and the study of two models as output variable and one model as input variable in addition t
... Show MoreThis paper discussed the solution of an equivalent circuit of solar cell, where a single diode model is presented. The nonlinear equation of this model has suggested and analyzed an iterative algorithm, which work well for this equation with a suitable initial value for the iterative. The convergence of the proposed method is discussed. It is established that the algorithm has convergence of order six. The proposed algorithm is achieved with a various values of load resistance. Equation by means of equivalent circuit of a solar cell so all the determinations is achieved using Matlab in ambient temperature. The obtained results of this new method are given and the absolute errors is demonstrated.
With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show More
Abstract
The aim of the present work is to control of metal buried corrosion by alteration the media method. This method depended on the characteristics of each media. The corrosion rates in different media (soil, sand, porcelanite stone and gravel) for specimens of low carbon steel were measured by two methods weight loss method and polarization method, weight loss measured by buried specimens in these medias separately for 90 days. The polarization method includes preparing of specimen and salt solutions have electrical resistivity equivalent electrical resistivity of these media. The corrosion rate of two method results in (soil > sand> porcelainte stone> gravel). The lower corrosion rate happene
... Show More
