A mathematical model has been introduced to investigate the effect of nuclear reaction constant ( A ), probability of the BEC ground state occupation Ω i, nD is the number density of deuteron (d) and the overall number of nuclei ND on the total nuclear d-d fusion rate (R). Under steady-state of the condensates of Bose-Einstein, the postulate of quantum theory and Bose-Einstein theory were applied to evaluate the total nuclear (d-d) fusion rate trapping in Nickel-metal The total nuclear fusion rate trapping predicts a strong relationship between astrophysical S-factor and masses of Nickel. The reaction rate trapping model was tested on three reaction d(d,p)T, d(d, n)3He and d(d, 4He)Q = 23.8MeV respectively. The reaction rate has described
... Show MoreThis study examines the transformation of political slogans, clichés, and stereotypes in Russia and Iraq during periods of political regime change in the late 20th and early 21st centuries. The main objective of the work is to identify and comparatively analyze the linguistic and cultural changes that accompanied political transformations in both countries. The research is based on theoretical concepts of political myth, framing, and critical discourse analysis. The research methodology includes content analysis of political texts, comparative analysis of linguistic transformations, and analysis of statistical data on cultural consumption. The main hypothesis is that, despite the presence of common trends in linguistic and cultural
... Show MoreThe software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreSilver sulfide and the thin films Ag2Se0.8Te0.2 and Ag2Se0.8S0.2 created by the thermal evaporation process on glass with a thickness of 350 nm were examined for their structural and optical properties. These films were made at a temperature of 300 K. According to the X-ray diffraction investigation, the films are polycrystalline and have an initial orthorhombic phase. Using X-ray diffraction research, the crystallization orientations of Ag2Se and Ag2Se0.8Te0.2 & Ag2Se0.8S0.2 (23.304, 49.91) were discovered (XRD). As (Ag2Se and Ag2Se0.8Te0.2 & Ag2Se0.8S0.2) absorption coefficient fell from (470-774) nm, the optical band gap increased (2.15 & 2 & 2.25eV). For instance, the characteristics of thin films made of Ag2Se0.8Te0.2 and Ag2Se0.8S0.2
... Show MoreAutism is considered as one of the most developmental problems in the world that interfere with children growth and affect their social ,emotional and cognitive development child with autism used to be normal in his growth but in his development parents started to notice that their child characterize by loneliness and withdrawal himself from the surrounding world with some mannerism behaviors these characteristics used to be manifested children during the 1st three year of their life . It appears, one in every 500 birth (The American International Institution for child health 1997. and it would be less in females than makes at 1/4 percent .
Aim is to b
... Show MorePerhaps the issue of media and the press, especially one of the most common topics that people deliberate and deal with permanently and continuously. An issue of such significance has pushed researchers to put the following question, “Is it possible to live without media?”, “Can people ignore the newspaper, radio, TV, or the other communication means?”
The answer is very simple. It is difficult for civilized society to overtake information, or dispense with circulation, at the individual or collective level. Yet, the question of how to make the media and how it determines its content still requires extensive media experience; and knowledge of the social structure and its relations; and ac
... Show MoreThe Hbl toxin is a three-component haemolytic complex produced by Bacillus cereus sensu lato strains and implicated as a cause of diarrhoea in B. cereus food poisoning. While the structure of the HblB component of this toxin is known, the structures of the other components are unresolved. Here, we describe the expression of the recombinant HblL1 component and the elucidation of its structure to 1.36 Å. Like HblB, it is a member of the alpha-helical pore-forming toxin family. In comparison to other members of this group, it has an extended hydrophobic beta tongue region that may be involved in pore formation. Molecular docking was used to predict possible interactions between HblL1 and HblB, and suggests a head to tail dimer might f
... Show MoreThe process of self-assessment plays a key role in achieving quality educational institutions (college, department or program academic particular), because the assessment process provides reviews of the effectiveness of the criteria used in the enterprise, especially in the field of teaching and learning, and is result self-assessment providing self-assessment report. The self- assessment can be performed at different levels (college, academic department, Master, Ph.D. program, or courses). The importance of the research focused on to provide a measure of self-assessment helps profile officials in the implementation of the assessment process are clear and precise and fast, and to provide them to measure the availability requireme
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show More