The partial level density PLD of pre-equilibrium reactions that are described by Ericson’s formula has been studied using different formulae of single particle level density . The parameter was used from the equidistant spacing model (ESM) model and the non- equidistant spacing model (non-ESM) and another formula of are derived from the relation between and level density parameter . The formulae used to derive are the Roher formula, Egidy formula, Yukawa formula, and Thomas –Fermi formula. The partial level density results that depend on from the Thomas-Fermi formula show a good agreement with the experimental data.
Nine new compounds of 2-amino-5-chlorobenzothiazole derivatives were synthesized. These new compounds were formed through the reaction of 2-amino-5-chlorobenzothiazole 1 with ethyl chloroacetate and KOH, which gave an ester derivative 2, followed by refluxing compound 2 with hydrazine hydrate to afford hydrazide derivative 3. The reaction of compound 3 with CS2 and KOH gave 1,3,4-oxadiazole-2-thiol derivative 4, and then the reaction of compound 2 with thiosemicarbazide to produce compound 5 then treated it with 4%NaOH led to ring closure to provide 1,2,4-triazole-3-thiol derivative
... Show MoreThis research was from an introduction, three topics and a conclusion, as follows:
The first topic: the concept of Islamic banks and their emergence and development, which includes three demands are:
The first requirement: the concept of Islamic banks and types, and there are two requirements:
* Definition of Islamic banks language and idiom.
* Types of Islamic banks.
The second requirement: the emergence and development of Islamic banks.
Third requirement: the importance of Islamic banks and their objectives.
We learned about the concept of banks and their origins and how they developed and what are the most important types of Islamic banks
The second topic: Formulas and sources of financing in Islamic banks and
It is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do rem
Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem. In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a
... Show MoreThe field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet
... Show MoreThis research deals with process of artistic conception of nature's images between becoming and buration, as an attempt to transfer the philosophical concepts to art via it's structural applications in forming the picture, due to the importance of these concepts which might be engaged with the vision of the artist in his own and subjective contention with the nature. The research consists of four chapters, first one included the problem of the research, importance, need to the research and the aim of the research represented by process of artistic conception of nature's images between becoming and buration. Also included the limits of research and most important terms. Second chapter included theoretical frame that consists of thre
... Show MoreIn this paper fractional Maxwell fluid equation has been solved. The solution is in the Mettag-Leffler form. For the corresponding solutions for ordinary Maxwell fluid are obtained as limiting case of general solutions. Finally, the effects of different parameters on the velocity and shear stress profile are analyzed through plotting the velocity and shear stress profile.
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreECG is an important tool for the primary diagnosis of heart diseases, which shows the electrophysiology of the heart. In our method, a single maternal abdominal ECG signal is taken as an input signal and the maternal P-QRS-T complexes of original signal is averaged and repeated and taken as a reference signal. LMS and RLS adaptive filters algorithms are applied. The results showed that the fetal ECGs have been successfully detected. The accuracy of Daisy database was up to 84% of LMS and 88% of RLS while PhysioNet was up to 98% and 96% for LMS and RLS respectively.