The - M ultiple mixing ratios of -transitions from levels of 56Fe populated in 56 56 Fe n n Fe ( , ) reactions are calculated by using const. S.T.M. This method has been used in other works [3,7] but with pure transition or with transitions that can be considered as pure transitions، in our work we used This method for mixed - transitions in addition to pure - transitions. The experimental angular distribution coefficients a2 was used from previous works [1] in order to calculet - values. It is clear from the results that the - values are in good agreement or consistent, within associated errors, with those reported previously [1]. The discrepancies that occur are due to inaccuracies existing in the experimental data of the previous works. The present work results confirm the validities of C.S.T.M. in calculating the -mixing ratios and their capabilities in predicting any inaccuracy in the experimental data and C.T.T.M. for mixed transition which are better than C.T.T.M. for pure transitions because it depends only on the experimental results while the 2nd method depends on pure and that which can be considered to be pure transitions.
In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
This paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.
In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe aim of the present study was to isolated the Enterococcus spp. from milk samples of cow and vaginal swabs from aborted women and patient women in Baghdad during September 2016 to april 2017. All 100 milk sample collecting was carried out on California Mastitis Test (CMT) and the positive Percentage of CMT reactions was 5% and the percentage of Enterococcus isolates from mastitic milk was 60% and 30% from nonmasitic milk. The prevalence of Enterococcus spp was 31% of milk samples and the prevalence of Enterococcus spp. Isolates were 67.74% of the isolates of cow milk samples were Enterococcus faecalis, 25.80% was Group D and 6.45% was non groupable while Enterococcus spp. isolates from aborted women samples were 20% and all isolated was
... Show MoreA many risk challenge in (settings hospital) are multi- bacteria are antibiotic-resistant. Some type strains that ability adhesion surface-attached bio-film census. Fifteen MRSA isolates were considered as high biofilm producers Moreover all MRSA isolates; M3, M5, M7 and M11 produced biofilms but the thickest biofilm seen M7strain. The MIC values of N. sativa oil against clinical isolates of MRSA were between (0.25, 0.5, 0.75, 1.0) μg/ml While MRSAcin (50, 75, 100, 125) µg\ ml. All biofilms treated with MRSAcin and Nigella sativa developed a presence of live cells after cultured on plate agar with inhibition zone between MIC (18 – 15) and (14- 11)mm respectively.Yet, results showed that MRSA supernatant developed a inhibitory ef
... Show MoreOur work included a synthesis of three new imine derivatives—1,3-thiazinan-4-one, 1,3-oxazinan-6-one and 1,3-oxazepin-4,7-dione—which contained an adamantyl fragment. These were produced via the condensation of the Schiff`s base (E)-N-(adamantan-1-yl)-1-(3-aryl)methanimine with 3-mercaptopropanoic acid; 3-chloropropanoic acid; and maleic, citraconic anhydride, respectively. These new imines were prepared via the condensation of adamantan-1-ylamine and 3-nitro-, 3-bromobenzaldehyde in n-BuOH. We obtained a good yield of products. FTIR, 1H NMR spectroscopy and C.H.N.S analysis were used to diagnostic the products. The molecular structure of (E)-N-(adamantan-1-yl
... Show More