The effects of short-range correlation on elastic Coulomb (charge) form factors, charge density distributions as well as root mean square charge radii of various nuclei (for instance, 46, 48, 50Ti, 52, 54Cr, 56, 58Fe, and 72, 74, 76Ge nuclei) are examined. The one- and two body terms of the cluster expansion together with the single-particle harmonic oscillator wave functions are utilized. For the purpose of embedding these effects into the formulae of charge density and form factor we employ the correlation function of Jastrow-type. These formulae depend upon the short-range correlation parameter (which instigates from the Jastrow function) and the oscillator size parameter Both and are found by the fitting to the measured elastic form factors. It is noticed that the embedding of short-range correlation effects into the calculations of and is a requisite for the achievement of a vital change in the computed results and remarkably vital for the characterization of the measured data.
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThis work discusses the beginning of fractional calculus and how the Sumudu and Elzaki transforms are applied to fractional derivatives. This approach combines a double Sumudu-Elzaki transform strategy to discover analytic solutions to space-time fractional partial differential equations in Mittag-Leffler functions subject to initial and boundary conditions. Where this method gets closer and closer to the correct answer, and the technique's efficacy is demonstrated using numerical examples performed with Matlab R2015a.
Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreThe electrochemical polymerization of the monomer sulfanilamide (SAM) in an aqueous solution at room temperature produces polysulfanilamide (PSAM). The Fourier Transform Infrared spectroscopy (FTIR) was used to investigate the properties of the prepared polymer layer that generated on the stainless steel (St.S) surface (working electrode) and Atomic Force Microscope (AFM) was used to characterize the morphology, topology, and detailed surface structure of polymer layer that generated on the surface. The corrosion behavior of uncoated and coated St.S were evaluated by using the electrochemical polarization method in a 0.2 M HCl solution and a temperature range of 293–323 K, the anticorrosion action of the polymer coating on stainless steel
... Show MoreThe theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses
... Show MoreThis study included partial purification of the lipase enzyme from the karnel of the pecan nut. After applying ion exchange chromatography technique using CM-Cellulose, two lipase isoenzymes were observed with specific activity values of 2.66 and 1.7 units/mg protein. The highest activity of both isoenzymes appeared at the optimum pH values of 8 and 6 and at temperatures of 40 and 50 °C, respectively. A pure single band was obtained by using electrophoresis technique and it was found that the approximate molecular weight was 42 kDa for the two isoenzymes. The study dealt with the preparation of the diester compound 1,4-diacetoxybenzene, which was diagnosed by GC-MS and 1H NMR spectrometry. When studying the inhibitio
... Show MoreIn the present paper, chitosan Schiff base has been synthesized from chitosan’s reaction with the salicyldehyde. The AuNPs was manufacture by extract of onion peels as a reducing agent. The Au NPs that have been prepared were characterized through the UV-vis spectroscopy, XRD analyses and SEM microscopy. The polymer blends of the chitosan Schiff base / PVP has been prepared through using the approach of solution casting. Chitosan Schiff base / PVP Au nano-composites was prepared. Nano composites and polymer blends have been characterized by FTIR which confirm the formation of Schiff base by revealing a new band of absorption at 1651cm-1 as a result of the (C=N) imine group. SEM, DSC and TGA confirms the thermal stability of
... Show More