Over the last few decades the mean field approach using selfconsistent
Haretree-Fock (HF) calculations with Skyrme effective
interactions have been found very satisfactory in reproducing
nuclear properties for both stable and unstable nuclei. They are
based on effective energy-density functional, often formulated in
terms of effective density-dependent nucleon–nucleon interactions.
In the present research, the SkM, SkM*, SI, SIII, SIV, T3, SLy4,
Skxs15, Skxs20 and Skxs25 Skyrme parameterizations have been
used within HF method to investigate some static and dynamic
nuclear ground state proprieties of 84-108Mo isotopes. In particular,
the binding energy, proton, neutron, mass and charge densities and
corresponding root mean square radius, neutron skin thickness and
charge form factor are calculated by using this method with the
Skyrme parameterizations mentioned above. The calculated results
are compared with the available experimental data. Calculations
show that the Skyrme–Hartree–Fock (SHF) theory with above
force parameters provides a good description on Mo isotopes.
The current study was conducted in Baghdad governorate (Karkh and Al-Rasafa regions) which included collecting 50 samples of freshly slaughtered sheep meat randomly collected from local slaughter areas and approved governmental slaughterhouses (25 liver and 25 ulna muscles). The results of the aflatoxin B1 detection showed that all samples were contaminated with this toxin at different concentrations ranging from 25–422 ppb and 65–492 ppb for each ulna muscles and liver, respectively. The histopathological and immunological study was conducted in meat samples containing higher and lower concentrations of the toxin. The results of the pathological study in the liver revealed that the concentration (492 ppb) caused thickening of t
... Show MoreIn this study, the aqueous extract of (Typha domingensis Pers.) pollen grain (qurraid) to know its ability to manufacture silver nanoparticles. Qurraid is a semi-solid yellow food substance, sold in Basra markets and eaten by the local population. It is made from the pollen of the T. domingensis Pers. plant after being pressed and treated with water vapor. The Gas chromatography–mass spectrometry (GC-MS) reaction was done to identify the active compounds of qurraid aqueous extract. The ability of the aqueous extract of qurraid to manufacture silver nanoparticles was tested, and the construction of silver nanoparticles was inferred by the reaction mixture's color, which ranged from yellow to dark brown. The synthesi
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show More: Sound forecasts are essential elements of planning, especially for dealing with seasonality, sudden changes in demand levels, strikes, large fluctuations in the economy, and price-cutting manoeuvres for competition. Forecasting can help decision maker to manage these problems by identifying which technologies are appropriate for their needs. The proposal forecasting model is utilized to extract the trend and cyclical component individually through developing the Hodrick–Prescott filter technique. Then, the fit models of these two real components are estimated to predict the future behaviour of electricity peak load. Accordingly, the optimal model obtained to fit the periodic component is estimated using spectrum analysis and Fourier mod
... Show Morehe aim of this study is to get a plant extracts to use it as molluscicides to control the snail vector of Schistosomiasis andfinely control the disease. Laboratory study was performed to compare the molluscicidal activity of leaves and stems extractsof Cucumis melo against Bulinus truncatus snail. The snail B. truncatus was exposed to a serial concentrations of leaves andstems extracts (4000ppm, 5000ppm) in this work. Different effects of the extracts to the snail B. truncatus were recorded.These effects includes death, escaping and imbalance of snail behavior. 96hr-LD50 values of leaves extracts were calculatedfor the doses 4000 and 5000ppm as (76 and 37%) respectively while for stems were (105 and 47%) respectively. We found thatthe snail
... Show MoreThe feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show More