Elastic magnetic M1 electron scattering form factor has been calculated for the ground state J,T=1/2-,1/2 of 13C. The single-particle model is used with harmonic oscillator wave function. The core-polarization effects are calculated in the first-order perturbation theory including excitations up to 5ħω, using the modified surface delta interaction (MSDI) as a residual interaction. No parameters are introduced in this work. The data are reasonably explained up to q~2.5fm-1 .
The species of Cr (III), Cr (VI) in biological samples and V(IV), V(V) in foods & plants samples were determined by spectrophotometric methods. Integrated spectral studies of complexes [Cr (III, VI)-DPC], [Cr (VI)-bipy], [VO-SH], [V (V)-8-HQ] which included a study of the optimum conditions for the complexes formation by the investigation of the chemical and physical variables affecting each complex formation, the nature of complexes, the preparation of calibration curves of the complexes and treated the resulted data by modern statistical methods and study the interfering species. Interferences were removed to explain the reactions thermodynamically by determining Ecell, Keq. and ∆G values and includes a study of
... Show MoreIn this study, a new type of circulating three-phase fluidized bed reactor was conducted by adding a spiral path and was named as spiral three-phase fluidized bed reactor (TPFB-S) to investigate the possibility for removing engine oil (virgin and waste form) from synthetic wastewater by using Ricinus communis (RC) leaves natural and activated by KOH. The biosorption process was conducted by changing particle diameter in the range 150–300 and 300–600 µm, liquid flow rate in the range 2.5–4.5 L/min and gas flow rate in range of 0–1 L/min, while other parameters initial oil emulsion concentration, pH, adsorbent concentration, agitation speed and contact time were kept constant at 2000 mg/L, 2,
In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreBackground: lip lengthening procedure is one of the surgical options for the correction of gummy smile in patients with short upper lip. Methods: A comparative clinical study was conducted on 15 patients requiring lip lengthening procedure for the esthetic correction of excessive gingival exposure with gummy smile. Scalpel was used in seven patients and diode laser in the remaining eight patients. Under infiltration anesthesia, about one cm strip of mucosa was excised at the vestibular depth and the mucosa of the lip was sutured to the alveolar mucosa. Results: The diode laser group demonstrated less postoperative pain and swelling. Regarding postoperative ecchymosis, three patients in the scalpel group developed ecchymosis and no cases
... Show More