The biggest problem of structural materials for fusion reactor is the damage caused by the fusion product neutrons to the structural material. If this problem is overcomed, an important milestone will be left behind in fusion energy. One of the important problems of the structural material is that nuclei forming the structural material interacting with fusion neutrons are transmuted to stable or radioactive nuclei via (n, x) (x; alpha, proton, gamma etc.) reactions. In particular, the concentration of helium gas in the structural material increases through deuteron- tritium (D-T) and (n, α) reactions, and this increase significantly changes the microstructure and the properties of the structural materials. Therefore, in this study, the effects of the different nuclear level density models on the excitation functions of the (n, α) reactions on 46-50Ti isotopes, an attractive candidate for the structural material for fusion reactors, have been investigated for the first time. Also, the differential cross-sections with respect to alpha energy for the emission of alpha particles of the 46-50Ti (n, xα) reactions have been investigated at 14.1 MeV incident neutron energy. The calculations are performed using the two-component exciton model in the TALYS 1.9 code, and the results are compared with available experimental data. The results of this study will contribute to nuclear database as required for improving, design and operations of the important facilities as ITER (International Thermonuclear Experimental Reactor), DEMO (The demonstration power plant) and ENS (European Nuclear Society).
Background :Evening preparation for colonoscopy is often unsatisfactory and inconvenient. This study was performed to compare the efficacy of bowel preparation at two different timings: night before and morning of endoscopy and to compare the cecal intubation rate and disturbance of sleep hours between these two groups.
Methods: In this prospective randomized endoscopist- blinded trial, 150 patients were enrolled between March 2010 and August 2011. Patients aged between 18 to 80 years needing colonoscopy were included. Patients with prior bowel surgery, suspected bowel obstruction or those who didn't completely fulfill the preparation instructions were excluded. Patients received polyethyelen glycol electrolyte preparation in a mornin
Non uniform channelization is a crucial task in cognitive radio receivers for obtaining separate channels from the digitized wideband input signal at different intervals of time. The two main requirements in the channelizer are reconfigurability and low complexity. In this paper, a reconfigurable architecture based on a combination of Improved Coefficient Decimation Method (ICDM) and Coefficient Interpolation Method (CIM) is proposed. The proposed Hybrid Coefficient Decimation-Interpolation Method (HCDIM) based filter bank (FB) is able to realize the same number of channels realized using (ICDM) but with a maximum decimation factor divided by the interpolation factor (L), which leads to less deterioration in stop band at
... Show MoreIn this paper, an adaptive active disturbance rejection control is newly designed for precise angular steering position tracking of the uncertain and nonlinear SBW system with time delay communications. The proposed adaptive active disturbance rejection control comprises the following two elements: (1) An adaptive extended state observer and (2) an adaptive state error feedback controller. The adaptive extended state observer with adaptive gains is employed for estimating the unmeasured velocity, acceleration, and compound disturbance which consists of system parameter uncertainties, nonlinearities, exterior disturbances, and time delay in which the observer gains are dynamically adjusted based on the estimation error to enhance est
... Show MoreThe modification of hydrophobic rock surfaces to the water-wet state via nanofluid treatment has shown promise in enhancing their geological storage capabilities and the efficiency of carbon dioxide (CO2) and hydrogen (H2) containment. Despite this, the specific influence of silica (SiO2) nanoparticles on the interactions between H2, brine, and rock within basaltic formations remains underexplored. The present study focuses on the effect of SiO2 nanoparticles on the wettability of Saudi Arabian basalt (SAB) under downhole conditions (323 K and pressures ranging from 1 to 20 MPa) by using the tilted plate technique to measure the contact angles between H2/brine and the rock surfaces. The findings reveal that the SAB's hydrophobicity intensif
... Show MoreThis research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
Background: Giant middle cerebral artery (MCA) aneurysms are surgically challenging lesions. Because of the complexity and variability of these aneurysms, a customized surgical technique is often needed for each case. In this article, we present a modified clip reconstruction technique of a ruptured complex giant partially thrombosed middle cerebral artery aneurysm.
Case description: The aneurysm was exposed using the pterional approach. Following proximal control, the aneurysm sac was decompressed. Then, we applied permanent clips to reconstruct the aneurysm neck. The configuration of the aneurysm mandated a tailored clipping pattern to account for resi
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More