The two-neutron halo-nuclei (17B, 11Li, 8He) was investigated using a two-body nucleon density distribution (2BNDD) with two frequency shell model (TFSM). The structure of valence two-neutron of 17B nucleus in a pure (1d5/2) state and in a pure (1p1/2) state for 11L and 8He nuclei. For our tested nucleus, an efficient (2BNDD's) operator for point nucleon system folded with two-body correlation operator's functions was used to investigate nuclear matter density distributions, root-mean square (rms) radii, and elastic electron scattering form factors. In the nucleon-nucleon forces the correlation took account of
... Show MoreThe nuclear structure of some cobalt (Co) isotopes with mass number A=56-60 has been studied depending on the effect of some physical properties such as the electromagnetic properties effects, such as, elastic longitudinal form factors, electric quadrupole moments, and magnetic dipole moments. The fp model space is used to present calculations using GXFP1 interaction by adopting the single particle wave functions of the harmonic oscillator. For all isotopes under consideration, the 40Ca nucleus is regarded as an inert core in fp model-space, while valence nucleons are moving through 1f7/2, 2p3/2, 1f5/2, and 2p1/2 orbits. The effects of core-polarization are obtained by the first orde
... Show MoreThe use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreInelastic longitudinal electron scattering form factors for second
excited state C42 in 42Ti nucleus have been calculated using shell
model theory. Fp shell model space with configuration (1f7/2 2p3/2
1f5/2 2p1/2) has been adopted in order to distribute the valence
particles (protons and neutrons) outside an inert core 40Ca. Modern
model space effective interactions like FPD6 and GXPF1 have been
used to generate model space vectors and harmonic oscillator wave
function as a single particle wave function. Discarder space (core
orbits + higher orbits) has been included in (core polarization effect)
as a first order correction in microscopic theory to measure the
interested multipole form factors via the model
The goal of this research is to introduce the concepts of Large-coessential submodule and Large-coclosed submodule, for which some properties are also considered. Let M be an R-module and K, N are submodules of M such that , then K is said to be Large-coessential submodule, if . A submodule N of M is called Large-coclosed submodule, if K is Large-coessential submodule of N in M, for some submodule K of N, implies that .
In this research, the semiparametric Bayesian method is compared with the classical method to estimate reliability function of three systems : k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be
... Show MoreThe fluctuation properties of energy spectrum, electromagnetic transition intensities and electromagnetic moments in nucleus are investigated with realistic shell model calculations. We find that the spectral fluctuations of are consistent with the Gaussian orthogonal ensemble of random matrices. Besides, we observe a transition from an order to chaos when the excitation energy is increased and a clear quantum signature of the breaking of chaoticity when the single-particle energies are increased. The distributions of the transition intensities and of the electromagnetic moments are well described by a Porter-Thomas distribution. The statistics of electromagnetic transition intensities clearly deviate from a Porter-Thomas distribution (i
... Show MoreInelastic longitudinal electron scattering form factors to 2+ and 4+ states in 65Cu nucleus has been calculated in the (2p3/2 1f 5/2 2p1/2) shell model space with the F5PVH effective interaction. The harmonic oscillator potential has been applied to calculate the wave functions of radial single-particle matrix elements. Two shell model codes, CP and NUSHELL are used to obtain results. The form factor of inelastic electron scattering to 1/21−, 1/22−, 3/22−, 3/23−, 5/21−, 5/22− and 7/2- states and finding the transition probabilities B (C2) (in units of e2 fm4) for these transitions and B (C4) (in units of e2 fm8) for the transition 7/2-, and comparing them with experimental data. Both the form factors and reduced transition pr
... Show MoreThe behavior and shear strength of full-scale (T-section) reinforced concrete deep beams, designed according to the strut-and-tie approach of ACI Code-19 specifications, with various large web openings were investigated in this paper. A total of 7 deep beam specimens with identical shear span-to-depth ratios have been tested under mid-span concentrated load applied monotonically until beam failure. The main variables studied were the effects of width and depth of the web openings on deep beam performance. Experimental data results were calibrated with the strut-and-tie approach, adopted by ACI 318-19 code for the design of deep beams. The provided strut-and-tie design model in ACI 318-19 code provision was assessed and found to be u
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show More