Nuclear structure of 20,22Ne isotopes has been studied via the shell model with Skyrme-Hartree-Fock calculations. In particular, the transitions to the low-lying positive and negative parity excited states have been investigated within three shell model spaces; sd for positive parity states, spsdpf large-basis (no-core), and zbme model spaces for negative parity states. Excitation energies, reduced transition probabilities, and elastic and inelastic form factors were estimated and compared to the available experimental data. Skyrme interaction was used to generate a one-body potential in the Hartree-Fock calculations for each selected excited states, which is then used to calculate the single-particle matrix elements. Skyrme interac
... Show MoreBackground: Dyslipidemia is defined as an abnormally high level of various lipids in the blood. It is considered a major risk for atherosclerosis and coronary artery disease. Genetic susceptibility can have a significant influence on the development and progression of dyslipidemia. ApoB-100 R3500Q mutation and ApoE variants are among those genetic risks for dyslipidemia. This study aims to assess the possible contribution of ApoB and ApoE variants on lipid profile among a group of early-onset ischemic heart disease (IHD) patients in comparison to a group of controls. Methods: Forty patients with dyslipidemia and early-onset IHD without chronic conditions likely to cause derangement of lipid levels were recruited to this case-control study
... Show MoreAugust Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive
... Show MoreBACKGROUND: SARS-CoV-2 (COVID-19) is considered a highly infectious and life threatening disease. OBJECTIVE: The present paper aims to evaluate various aspects of preventive measures and clinical management of the scheduled visits for orthodontic patients to the dental clinics during the outbreak of COVID-19, and to assess how orthodontists dealt with this challenge. METHODS: Orthodontists in private and public clinics were invited to fill a questionnaire that addressed infection control protocols and concerns about clinical management of patients in the clinics during the pandemic. Frequncies and percentages of the responses were obtained and compared using Chi-square tests. RESULTS: About 77% of those working in private clinics, a
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreVol. 6, Issue 1 (2025)
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show More