The partial level density PLD of pre-equilibrium reactions that are described by Ericson’s formula has been studied using different formulae of single particle level density . The parameter was used from the equidistant spacing model (ESM) model and the non- equidistant spacing model (non-ESM) and another formula of are derived from the relation between and level density parameter . The formulae used to derive are the Roher formula, Egidy formula, Yukawa formula, and Thomas –Fermi formula. The partial level density results that depend on from the Thomas-Fermi formula show a good agreement with the experimental data.
Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show MoreIn this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for
... Show MoreDifferent ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach
In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
Background: Maxillary canines are important aesthetically and functionally, but impacted canines are more difficult and time consuming to treat, the aim of this study is to investigate with multi-detector computed tomography the correlation between the bone density and the upper canine impaction. Material and method: A sample of Unilaterally impacted maxillary canines from 24 patients (19 female, 5 male) who were referred to accurately localize the impacted canines at al- Karkh general hospital were evaluated by a volumetric 3-d images by the multi-detector computed tomography to accurately measure the bone density of the maxillary cortical palate of the maxillary impacted canine side and compare it with the other side of the normally erupt
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreThis study aims at recognizing the levels of comprehension of the students of basic schools to the concepts of mathematical geometric and discovering the existing of the differences among students in the level of understanding of the concepts of mathematical geometrical which is due to the change of gender.
The sample of the study is the students of Basic schools, eight level in the basic school of Erbil city, particularly 7-8-and 9 levels in the academic year 2013-2014. The sample consists of 444 students in both genders238 males and 206 females.
The tool of the study is test sheet included 20 items of multiple choice. The items are valid since are given to a jury of expert
... Show More
In this research, experimental and numerical studies were carried out to investigate the performance of encased glass-fiber-reinforced polymer (GFRP) beams under fire. The test specimens were divided into two peer groups to be tested under the effect of ambient and elevated temperatures. The first group was statically tested to investigate the monotonic behavior of the specimens. The second group was exposed to fire loading first and then statically tested to explore the residual behavior of the burned specimens. Adding shear connectors and web stiffeners to the GFRP beam was the main parameter in this investigation. Moreover, service loads were applied to the tested beams during the fire. Utilizing shear connectors, web stiffeners,
... Show More