The minimum approaches distance of probing electrons in scanning electron microscope has investigated in accordance to mirror effect phenomenon. The analytical expression for such distance is decomposed using the binomial expansion. With aid of resulted expansion, the distribution of trapped electrons within the sample surface has explored. Results have shown that trapped electron distributes with various forms rather an individual one. The domination of any shape is mainly depend on the minimum approaches distance of probing electrons
An expression for the transition charge density is investigated where the deformation in nuclear collective modes is taken into consideration besides the shell model transition density. The inelastic longitudinal form factors C2 calculated using this transition charge density with excitation of the levels for Cr54,52,50 nuclei. In this work, the core polarization transition density is evaluated by adopting the shape of Tassie model together with the derived form of the ground state two-body charge density distributions (2BCDD's). It is noticed that the core polarization effects which represent the collective modes are essential in obtaining a remarkable agreement between the calculated inelastic longitudinal F(q)'s and those of experimen
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The main aim of this research paper is investigating the effectiveness and validity of Meso-Scale Approach (MSA) as a modern technique for the modeling of plain concrete beams. Simply supported plain concrete beam was subjected to two-point loading to detect the response in flexural. Experimentally, a concrete mix was designed and prepared to produce three similar standard concrete prisms for flexural testing. The coarse aggregate used in this mix was crushed aggregate. Numerical Finite Element Analysis (FEA) was conducted on the same concrete beam using the meso-scale modeling. The numerical model was constructed to be a bi-phasic material consisting of cement mortar and coarse aggregate. The interface between the two c
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreIn this research the change in the distance of the two stars in two binary star systems (13.6+8)M8and (13+10)M8 was studied, through the calculations the value (rate of mass transfer) of the two phases of dynamical stages of mass which are mass loss and mass transfer has been extracted in its own way ,by extracting the value of the value of (the distance variation between the two stars) has been found only in the mass transfer stage by using mathematical model ,in mass loss stage and were calculated from the change and the difference between the values of each at different times of binary star system evolution ,it was found that the maximum values of and are in ma
... Show MoreSurvivin, a member of inhibitor of apoptosis family is increasingly used as a target for cancer therapy design because it has a key role in cell growth and inhibition of cell apoptosis. Also it can be used as a biomarker for targeting cancer because it is found in almost all cancer but not normal cells. Our strategy was to design (computationally) a molecule to be used as survivin inhibitor. This molecule was named lead10 and was used furthermore to find (virtually) existing drugs with a good survivin inhibition activity.
The aim of this work is to calculate the one- electron expectation value of the electronic charge of atomic system Z=2,3….7 and we compare with He atom . the electronic density function D(r1) of He atom and like ions are evaluated . using Hartree –Fock wave.