Inelastic longitudinal electron scattering form factors have been calculated for isoscaler transition
T = 0 of the (0+ ®2+ ) and (0+ ®4+ ) transitions for the 20Ne ,24Mg and 28Si nuclei. Model
space wave function defined by the orbits 1d5 2 ,2s1 2 and 1d3 2 can not give reasonable result for
the form factor. The core-polarization effects are evaluated by adopting the shape of the Tassie-
Model, together with the calculated ground Charge Density Distribution CDD for the low mass 2s-1d
shell nuclei using the occupation number of the states where the sub-shell 2s is included with an
occupation number of protons (a ) .
Background: Diabetes and periodontitis are considered as chronic diseases with a bidirectional relationship between them. This study aimed to determine and compare the severity of periodontal health status and salivary parameters in diabetic and non-diabetic patients with chronic periodontitis. Materials and Methods: Seventy participants were enrolled in this study. The subjects were divided into three groups: Group I: 25 patients had type 2 diabetes mellitus with chronic periodontitis, Group 2: 25 patients had chronic periodontitis and with no history of any systemic diseases, Group 3: 20 subjects had healthy periodontium and were systemically healthy. Unstimulated whole saliva was collected for measurement of salivary flow rate and pH.
... Show MoreYohimbine is actually confirmed in the United States to be utilized for erectile dysfunction; and recently such drug has become commonly used in body-building communities for its presumed lipolytic and sympathomimetic effects. But ingestion of such drug can bring about epileptic neurotoxic effects.
Many antiepileptic drugs can be utilized to counteract myoclonic seizure; furthermore, diazepam can be used to oppose such type of seizure; in addition, surrogate therapeutic options such as omega 3 may also be utilized.
In this study, twenty-four (24) mice of both sexes weighing 20-25g were randomly-allocated into 4 groups (6 animals each group) as follows: Group I-
... Show MoreBackground In recent years, there has been a notable increase in the level of attention devoted to exploring capabilities of nanoparticles, specifically gold nanoparticles AuNPs, within context of modern times. AuNPs possess distinct biophysical properties, as a novel avenue as an antibacterial agent targeting Streptococcus Mutans and Candida Albicans. The aim of this study to create a nano-platform that has the potential to be environmentally sustainable, in addition to exhibiting exceptional antimicrobial properties against Streptococcus Mutans as well as Candida Albicans. Methods this study involved utilization of
Tungsten inert gas arc welding–based shaped metal deposition is a novel additive manufacturing technology which can be used for fabricating solid dense parts by melting a cold wire on a substrate in a layer-by-layer manner via continuous DC arc heat. The shaped metal deposition method would be an alternative way to traditional manufacturing methods, especially for complex featured and large-scale solid parts manufacturing, and it is particularly used for aerospace structural components, manufacturing, and repairing of die/molds and middle-sized dense parts. This article presents the designing, constructing, and controlling of an additive manufacturing system using tungsten inert gas plus wire–based shaped metal deposition metho
... Show MoreThe electrical resistivity method is one of the geophysical methods for detecting weak subsurface zone. The 2D resistivity data were used to compare three electrode configurations, Wenner, Dipole-dipole, and Schlumberger, to detect weak subsurface zones along a profile south of Baghdad near the Bismayah pumping station. The results show many zones of low resistivity that may be weak zones. A dipole-dipole array is a large number of measurements and is more sensitive than others. The Wenner-Schlumberger array has a depth also higher than other arrays. Wenner array has higher signal strength than other arrays. Because it is more sensitive to horizontal and vertical structures, the dipole-dipole array is the optimum for mapping sub
... Show MoreIn this work, thiadiazole derivatives were prepared by taking advantage of active sites in (2-amino-5-mercapto-1, 3, 4-thiadiazole) as a starting material base. The main heterocyclic compounds (1, 3, 4-thiadiazole, oxazole) etc, 2-amino-5-mercapto-1,3,4-thiadiazole compound (1) was prepared by cyclic closure of thiosemicarbazide compound with anhydrous sodium carbonate and carbon disulfide. Oxidation of (1) via hydrogen peroxide, to have (2) which was treated with chloro acetyl chloride to get (3). Preparation of thiazole ring (4) was from reacting of (3) with thiourea. Synthesis of diazonium salts (5) from compound (4) using sodium nitrite and HCl. Compound (5) reacted with different ester compounds to prepare a new azo compounds (6–8).C
... Show MoreA series of new 4-(((4-(5-(Aryl)-1,3,4-oxadiazol-2-yl)benzyl)oxy)methyl)-2,6-dimethoxy phenol (6a-i) were synthesized from cyclization of 4-(((4-hydroxy-3,5-dimethoxy benzyl)oxy)methyl)benzohydrazide with substituted carboxylic acid in the presences of phosphorusoxy chloride.The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to screen their antioxidant properties. Compounds 6i and 6h exhibited significant antioxidant ability in both assay. Furthermore, type of substituent and their position of the aryl attached 1,3,4-oxadiazole ring at position five are play an important roles in enhancing or declining the antio
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More