The biggest problem of structural materials for fusion reactor is the damage caused by the fusion product neutrons to the structural material. If this problem is overcomed, an important milestone will be left behind in fusion energy. One of the important problems of the structural material is that nuclei forming the structural material interacting with fusion neutrons are transmuted to stable or radioactive nuclei via (n, x) (x; alpha, proton, gamma etc.) reactions. In particular, the concentration of helium gas in the structural material increases through deuteron- tritium (D-T) and (n, α) reactions, and this increase significantly changes the microstructure and the properties of the structural materials. Therefore, in this study, the effects of the different nuclear level density models on the excitation functions of the (n, α) reactions on 46-50Ti isotopes, an attractive candidate for the structural material for fusion reactors, have been investigated for the first time. Also, the differential cross-sections with respect to alpha energy for the emission of alpha particles of the 46-50Ti (n, xα) reactions have been investigated at 14.1 MeV incident neutron energy. The calculations are performed using the two-component exciton model in the TALYS 1.9 code, and the results are compared with available experimental data. The results of this study will contribute to nuclear database as required for improving, design and operations of the important facilities as ITER (International Thermonuclear Experimental Reactor), DEMO (The demonstration power plant) and ENS (European Nuclear Society).
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreBackground: It was stated in scientific literatures that the entire craniofacial complex is influenced by the growth of the cranial base structures. Nevertheless, many times this is not the case, and this point is subject to great controversy so the aim of this study is to evaluate the possible differences in cranial base shape and flexure between different skeletal classes for both genders and to investigate any possible correlation between cranial base variables and other skeletal base variables. Materials and Methods: The sample include 75 lateral cephalometric radiographs of Iraqi adults aged between 18-25 years (39 males, 36 females), collected from patients and undergraduate students in the orthodontic department of College of Dentist
... Show MoreNanoparticles (NPs) based techniques have shown great promises in all fields of science and industry. Nanofluid-flooding, as a replacement for water-flooding, has been suggested as an applicable application for enhanced oil recovery (EOR). The subsequent presence of these NPs and its potential aggregations in the porous media; however, can dramatically intensify the complexity of subsequent CO2 storage projects in the depleted hydrocarbon reservoir. Typically, CO2 from major emitters is injected into the low-productivity oil reservoir for storage and incremental oil recovery, as the last EOR stage. In this work, An extensive serious of experiments have been conducted using a high-pressure temperature vessel to apply a wide range of CO2-pres
... Show MoreExcessive water production is a persistent challenge in oil and gas wells, with polymer and gel solutions commonly employed for water control. This study investigates the rheological behaviour of cross-linked polyacrylamide gels and their impact on water shutoff treatment in gas wells. Rheological measurements, coreflooding experiments using Berea sandstone samples, and micromodel flow visualizations were conducted to evaluate gel performance. Results showed that during water injection, the water residual resistance factor ( Frrw ) decreases with increasing flow rates, mainly due to gel shear thinning behaviour and reduced residual gas saturation. Higher polymer concentrations in the gel enhance water permeability reduction. In contrast, un
... Show More