The nuclear ground-state structure of some Nickel (58-66Ni) isotopes has been investigated within the framework of the mean field approach using the self-consist Hartree-Fock calculations (HF) including the effective interactions of Skyrme. The Skyrme parameterizations SKM, SKM*, SI, SIII, SKO, SKE, SLY4, SKxs15, SKxs20 and SKxs25 have been utilized with HF method to study the nuclear ground state charge, mass, neutron and proton densities with the corresponding root mean square radii, charge form factors, binding energies and neutron skin thickness. The deduced results led to specifying one set or more of Skyrme parameterizations that used to achieve the best agreement with the available experimental data.
Currently, one of the topical areas of application of machine learning methods is the prediction of material characteristics. The aim of this work is to develop machine learning models for determining the rheological properties of polymers from experimental stress relaxation curves. The paper presents an overview of the main directions of metaheuristic approaches (local search, evolutionary algorithms) to solving combinatorial optimization problems. Metaheuristic algorithms for solving some important combinatorial optimization problems are described, with special emphasis on the construction of decision trees. A comparative analysis of algorithms for solving the regression problem in CatBoost Regressor has been carried out. The object of
... Show MoreBuckling analysis of a laminated composite thin plate with different boundary conditions subjected to in-plane uniform load are studied depending on classical laminated plate theory; analytically using (Rayleigh-Ritz method). Equation of motion of the plates was derived using the principle of virtual work and solved using modified Fourier displacement function that satisfies general edge conditions. The eigenvalue problem generated by using Ritz method, the set of linear algebraic equations can be solved using MATLAB for symmetric and anti-symmetric, cross and angle-ply laminated plate considering some design parameters such as aspect ratios, number of layers, lamination type and orthotropic ratio. The results obtained g
... Show MoreShallow foundations are usually used for structures with light to moderate loads where the soil underneath can carry them. In some cases, soil strength and/or other properties are not adequate and require improvement using one of the ground improvement techniques. Stone column is one of the common improvement techniques in which a column of stone is installed vertically in clayey soils. Stone columns are usually used to increase soil strength and to accelerate soil consolidation by acting as vertical drains. Many researches have been done to estimate the behavior of the improved soil. However, none of them considered the effect of stone column geometry on the behavior of the circular footing. In this research, finite ele
... Show MoreThe main aim of this study is to investigate the ability of four local entomopathogenic isolates Beauveria bassiana (Bals.) and Metarhizium anisopliae (Met.) to control the mosquito larvae in the lab. The results revealed that the isolate (MARD48) B .bassiana reduced the survival rate of the mosquito larvae to (80%) followed by the isolate M. anisopliae (MARD10) to (90%) in the first two days of treatment, and 60 and 66% respectively in the third day. The results also showed that the isolate B. bassiana (MARD48) killed 50% of the population (LC50) with the concentration 1×104 conidia/ml compared to 1×107 conidia/ml for the isolates B. bassiana (MARD14) and M. anisopliae (MARD10), and 1×108 conidia/ml for the isolate B .bassiana (MARD76).
... Show MoreResearch seeks to test the impact of the dimensions of mindfulness on organizational Innovation, proposed in the light of the review literature on two variables of the research, which referred in General to the dynamic relationship between them, as result of weakness of mindfulness as one important factor driving the diversity of innovation and time, ways to sustain and preserve and then support innovations made by creators, weakness in the overall level of organizational Innovation, this represents the problem research, data collection over designing identification, distributed to sample Formed from (30) head Department at a number of colleges of the University of Baghdad, results confirms the validity of resea
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreThe purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators