The biggest problem of structural materials for fusion reactor is the damage caused by the fusion product neutrons to the structural material. If this problem is overcomed, an important milestone will be left behind in fusion energy. One of the important problems of the structural material is that nuclei forming the structural material interacting with fusion neutrons are transmuted to stable or radioactive nuclei via (n, x) (x; alpha, proton, gamma etc.) reactions. In particular, the concentration of helium gas in the structural material increases through deuteron- tritium (D-T) and (n, α) reactions, and this increase significantly changes the microstructure and the properties of the structural materials. Therefore, in this study, the effects of the different nuclear level density models on the excitation functions of the (n, α) reactions on 46-50Ti isotopes, an attractive candidate for the structural material for fusion reactors, have been investigated for the first time. Also, the differential cross-sections with respect to alpha energy for the emission of alpha particles of the 46-50Ti (n, xα) reactions have been investigated at 14.1 MeV incident neutron energy. The calculations are performed using the two-component exciton model in the TALYS 1.9 code, and the results are compared with available experimental data. The results of this study will contribute to nuclear database as required for improving, design and operations of the important facilities as ITER (International Thermonuclear Experimental Reactor), DEMO (The demonstration power plant) and ENS (European Nuclear Society).
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThere has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
In this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.
The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Insufficient and poor sleep quality significantly impacts the health and quality of life of persons with end-stage renal failure (ESRF) on hemodialysis. This study explored the effectiveness of teaching patients on hemodialysis, Benson’s relaxation technique. Seventy-one persons on hemodialysis in Iraq were randomly assigned to either the experimental or the control group. The experimental group received training and encouragement to use the Benson relaxation technique. The Pittsburgh Sleep Quality Index (PSQI) score was collected for all the patients before and after the intervention. After 8 weeks a repeated measurement of the post-test on sleep quality was done for both groups. The experimental group showed a statistically sign
... Show MoreTraining has an effect on employees’ performances. Accordingly, the person who is responsible for employees’ development must figure out the most effective way to train and develop employees. Central Michigan University (CMU) has recognized the importance of providing appropriate training for employees who have a duty in advising students. The reason is that these employees have a significant impact on students’ educational performances. Thus, special attention to this category of employees is needed to improve advising quality. This research attempted to explore the impact of training on academic advising at CMU. Face-to-face interviews and online surveys were used as data collection tools for this study. The study scope c
... Show MoreBackground: Denture relining is the process of resurfacing of the tissue side of the ill fitting denture, the bond strength at the relining-denture base interface is most important for denture durability.The aim of present study was to evaluate the shear bond strength between the thermosens as relining material and different denture base materials that bonded by thermo fusing liquid. As this corrective procedureis the common chair side procedure in the dental clinic. Material and method: Sixty samples were prepared and divided into three main groups according to the type of denture base materials.Group (A) referred to the heat cure acrylic samples which consisted of 20 samples. Group (B) referred to the high impact acrylic samples which con
... Show More